Apple QuickTime/Darwin Streaming Server parse_xml.cgi文件泄露漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107228 漏洞类型 路径遍历
发布时间 2003-02-28 更新时间 2003-12-31
CVE编号 CVE-2003-1414 CNNVD-ID CNNVD-200312-081
漏洞平台 CGI CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/22312
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200312-081
|漏洞详情
AppleDarwinStreamingServer4.1.2和AppleQuicktimeStreamingServer4.1.1版本的parse_xml.cg存在目录遍历漏洞。远程攻击者借助filename参数的...(三点)读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/6990/info

A file retrieval vulnerability has been reported for QuickTime/Darwin Streaming Server. The vulnerability exists due to insufficient sanitization of some parameters given to the parse_xml.cgi script. Information obtained in this manner may be used by an attacker to launch more organinzed attacks against a vulnerable system.

This vulnerability was tested on SS for Microsoft Windows systems. 

http://localhost:1220/parse_xml.cgi?filename=.../qtusers
|参考资料

来源:XF
名称:darwin-dotdotdot-directory-traversal(11446)
链接:http://xforce.iss.net/xforce/xfdb/11446
来源:BID
名称:6990
链接:http://www.securityfocus.com/bid/6990
来源:BUGTRAQ
名称:20030228Re:QuickTime/DarwinStreamingAdministrationServerMultiplevulnerabilities
链接:http://www.securityfocus.com/archive/1/313517
来源:SREASON
名称:3260
链接:http://securityreason.com/securityalert/3260