微慑信息网

CVE-2008-0300-漏洞详情

CVE-2008-0300
CVSS 6.8
发布时间 :2008-03-11 19:44:00
修订时间 :2011-03-07 22:04:17
NMCOEPS    

[原文]mapFiler.php in Mapbender 2.4 to 2.4.4 allows remote attackers to execute arbitrary PHP code via PHP code sequences in the factor parameter, which are not properly handled when accessing a filename that contains those sequences.


[CNNVD]Mapbender ‘mapFiler.php’ 代码注入漏洞(CNNVD-200803-174)

        Mapbender中的mapFiler.php存在代码注入漏洞。远程攻击者通过系数参数中的PHP代码序列来执行任意PHP代码。该序列在登陆包含该序列的文件名时并没经过合适的处理。


CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]


CWE (弱点类目)

CWE-94 [对生成代码的控制不恰当(代码注入)]


CPE (受影响的平台与产品)

cpe:/a:mapbender:mapbender:2.4.4
cpe:/a:mapbender:mapbender:2.4.3
cpe:/a:mapbender:mapbender:2.4.2
cpe:/a:mapbender:mapbender:2.4
cpe:/a:mapbender:mapbender:2.4.1


OVAL (用于检测的技术细节)

未找到相关OVAL定义


官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0300

(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0300

(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200803-174

(官方数据源) CNNVD


其它链接及资源

http://www.securityfocus.com/bid/28195


(PATCH)  BID  28195
http://xforce.iss.net/xforce/xfdb/41131


(UNKNOWN)  XF  mapbender-mapfilter-code-execution(41131)
http://xforce.iss.net/xforce/xfdb/41131


(UNKNOWN)  XF  mapbender-mapfiler-code-execution(41131)
http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php


(UNKNOWN)  MISC  http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php
http://www.milw0rm.com/exploits/5232


(UNKNOWN)  MILW0RM  5232
http://secunia.com/advisories/29329


(UNKNOWN)  SECUNIA  29329


漏洞信息

Mapbender ‘mapFiler.php’ 代码注入漏洞
中危 代码注入
2008-03-11 00:00:00 2008-09-05 00:00:00
远程  
        Mapbender中的mapFiler.php存在代码注入漏洞。远程攻击者通过系数参数中的PHP代码序列来执行任意PHP代码。该序列在登陆包含该序列的文件名时并没经过合适的处理。


公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:


        http://www.mapbender.org/


        


漏洞信息 (5232)

Mapbender <= 2.4.4 (mapFiler.php) Remote Code Execution Vulnerability (EDBID:5232)
php webapps
2008-03-11 Verified
0 RedTeam Pentesting

N/A

[点击下载]


漏洞信息 (F64487)

rt-sa-2008-001.txt (PacketStormID:F64487)

2008-03-13 00:00:00
 

exploit,remote,php,code execution

CVE-2008-0300

[点击下载]

Mapbender versions 2.4.4 and below suffer from a remote code execution vulnerability in mapFiler.php.


漏洞信息


42847
Mapbender mapFiler.php factor Variable Arbitrary PHP Code Execution

Remote / Network Access

Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified,
Vendor Verified,
Coordinated Disclosure


漏洞描述


时间线


2008-03-11

2007-12-14
2008-03-11 2008-03-10


解决方案

Upgrade to version 2.4.5 rc1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.


相关参考


漏洞作者

Unknown or Incomplete


漏洞信息

Mapbender ‘factor’ Parameter Remote Code Injection Vulnerability

Input Validation Error

28195
Yes No
2008-03-11 12:00:00 2008-03-12 06:31:00

RedTeam Pentesting GmbH is credited with the discovery of this vulnerability.


受影响的程序版本

Mapbender Mapbender 2.4.4

Mapbender Mapbender 2.4.3

Mapbender Mapbender 2.4.2

Mapbender Mapbender 2.4.1

Mapbender Mapbender 2.4

Mapbender Mapbender 2.4.5 rc1


不受影响的程序版本

Mapbender Mapbender 2.4.5 rc1


漏洞讨论

Mapbender is prone to a remote code-injection vulnerability because the application fails to properly sanitize user-supplied input.



Exploiting this issue allows attackers to execute arbitrary code within the context of the webserver.



This issue affects Mapbender 2.4 to 2.4.4; other versions may also be affected.


漏洞利用

Attackers can exploit this issue via a browser.



The following proof of concept is available:


解决方案

The vendor has released updates. Please see the references for more information.





Mapbender Mapbender 2.4.4


相关参考

本文标题:CVE-2008-0300-漏洞详情
本文链接:
(转载请附上本文链接)
http://vulsee.com/archives/vulsee_2019/0713_2908.html
转载请附本站链接,未经允许不得转载,,谢谢:微慑信息网-VulSee.com » CVE-2008-0300-漏洞详情
分享到: 更多 (0)

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址

微慑信息网 专注工匠精神

访问我们联系我们