Apache的mod_alias模块CGI脚本源码信息泄露漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110782 漏洞类型 其他
发布时间 2006-08-09 更新时间 2007-02-08
CVE编号 CVE-2006-4110 CNNVD-ID CNNVD-200608-203
漏洞平台 Multiple CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/28365
https://cxsecurity.com/issue/WLB-2006080079
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-203
|漏洞详情
Apache是一款开放源代码WEB服务程序。Apache的mod_alias模块在支持区分大小写目录名的文件系统上处理区分大小写的别名指令参数时存在规范化错误。如果攻击者访问有大写的目录名(如CGI-BIN)的URL的话,就可以在ScriptAlias指令引用了文档根目录中目录的某些非默认配置中泄漏cgi-bin目录中应用程序的源码。有漏洞配置示例:DocumentRoot"[path]/docroot/"ScriptAlias/cgi-bin/"/[path]/docroot/cgi-bin"
|漏洞EXP
source: http://www.securityfocus.com/bid/19447/info

Apache is prone to an information-disclosure vulnerability because it fails to properly handle exceptional conditions.

An attacker can exploit this issue to retrieve script source code. Information obtained may aid in further attacks.

Versions 2.2.2 for Microsoft Windows is vulnerable to this issue; other versions may also be affected.

http://www.example.com/CGI-BIN/foo
|参考资料

来源:XF
名称:apache-modalias-information-disclosure(28357)
链接:http://xforce.iss.net/xforce/xfdb/28357
来源:BID
名称:19447
链接:http://www.securityfocus.com/bid/19447
来源:BUGTRAQ
名称:20060817Re:Re:CGIScriptSourceCodeDisclosureVulnerabilityinApacheforWindows
链接:http://www.securityfocus.com/archive/1/archive/1/443487/100/200/threaded
来源:BUGTRAQ
名称:20060809CGIScriptSourceCodeDisclosureVulnerabilityinApacheforWindows
链接:http://www.securityfocus.com/archive/1/archive/1/442882/100/0/threaded
来源:OSVDB
名称:27913
链接:http://www.osvdb.org/27913
来源:VUPEN
名称:ADV-2006-3265
链接:http://www.frsirt.com/english/advisories/2006/3265
来源:SECUNIA
名称:21490
链接:http://secunia.com/advisories/21490
来源:SREASON
名称:1370
链接:http://securityreason.com/securityalert/1370