Web模式ntop文件执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105951 漏洞类型 未知
发布时间 2000-08-02 更新时间 2005-08-17
CVE编号 CVE-2000-0705 CNNVD-ID CNNVD-200010-052
漏洞平台 Linux CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20143
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200010-052
|漏洞详情
Web模式的ntop存在漏洞。远程攻击者可以借助..(点点)攻击读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/1550/info

ntop is a tool that shows the network usage, similar to what the popular top Unix command does. Starting ntop in web mode (with the -w parameter) starts ntop with it's own built in HTTP server, to allow remote access to the functions it provides. ntop does not properly authenticate requests and is vulnerable to a ../../ request whereby unauthorized files can be retrieved, including files which are only readable by root. 

The default directory ntop serves HTML from is /etc/ntop/html so to retrieve /etc/shadow one can request the following URL: http://URL:port/../../shadow
|参考资料

来源:BID
名称:1550
链接:http://www.securityfocus.com/bid/1550
来源:BUGTRAQ
名称:20000802[Hackerslabbug_paper]ntopwebmodevulnerabliity
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0459.html
来源:REDHAT
名称:RHSA-2000:049
链接:http://www.redhat.com/support/errata/RHSA-2000-049.html
来源:OSVDB
名称:1496
链接:http://www.osvdb.org/1496