| CVE-2008-1301 |
|
发布时间 :2008-03-12 13:44:00 | ||
| 修订时间 :2008-09-05 00:00:00 | ||||
| NMCO |
[原文]Absolute path traversal vulnerability in system/workplace/admin/workplace/logfileview/logfileViewSettings.jsp in Alkacon OpenCms 7.0.3 and 7.0.4 allows remote authenticated administrators to read arbitrary files via a full pathname in the filePath.0 parameter.
[CNNVD]Alkacon OpenCms ‘logfileViewSettings.jsp’ 目录遍历漏洞(CNNVD-200803-193)
Alkacon OpenCms中的system/workplace/admin/workplace/logfileview/logfileViewSettings.jsp存在完全路径游历漏洞。远程授权管理员通过filePath.0参数中一个完整的路径名来读取任意文件。
–
CVSS (基础分值)
| CVSS分值: | 4 | [中等(MEDIUM)] |
| 机密性影响: | PARTIAL | [很可能造成信息泄露] |
| 完整性影响: | NONE | [不会对系统完整性产生影响] |
| 可用性影响: | NONE | [对系统可用性无影响] |
| 攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
| 攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
| 身份认证: | SINGLE_INSTANCE | [–] |
–
CWE (弱点类目)
| CWE-22 | [对路径名的限制不恰当(路径遍历)] |
–
CPE (受影响的平台与产品)
| cpe:/a:alkacon:opencms:7.0.4 | Alkacon OpenCms 7.0.4 |
| cpe:/a:alkacon:opencms:7.0.3 | Alkacon OpenCms 7.0.3 |
–
OVAL (用于检测的技术细节)
| 未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
|
http://xforce.iss.net/xforce/xfdb/41096 (UNKNOWN) XF opencms-logfileviewsettings-info-disclosure(41096) |
|
http://www.securityfocus.com/bid/28152 (UNKNOWN) BID 28152 |
|
http://www.securityfocus.com/archive/1/archive/1/489291/100/0/threaded (UNKNOWN) BUGTRAQ 20080308 Alkacon OpenCms logfileViewSettings.jsp XSS, file disclosure |
|
http://securityreason.com/securityalert/3731 (UNKNOWN) SREASON 3731 |
|
http://secunia.com/advisories/29278 (VENDOR_ADVISORY) SECUNIA 29278 |
–
漏洞信息
| Alkacon OpenCms ‘logfileViewSettings.jsp’ 目录遍历漏洞 | |
| 中危 | 路径遍历 |
| 2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
| 远程 | |
| Alkacon OpenCms中的system/workplace/admin/workplace/logfileview/logfileViewSettings.jsp存在完全路径游历漏洞。远程授权管理员通过filePath.0参数中一个完整的路径名来读取任意文件。 | |
–
公告与补丁
|
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接: Alkacon OpenCMS 7.0.3 Alkacon Alkacon 7.0.4 http://www.opencms.org/en/modules/downloads/begindownload.html?id=14f9c938-e77b-11dc-ad81-b7a33137a728 |
–
漏洞信息
42785 |
|
| Alkacon OpenCms logfileViewSettings.jsp filePath.0 Parameter Arbitrary File Access | |
Remote / Network Access |
Input Manipulation |
| Loss of Confidentiality | |
| Exploit Unknown | |
–
漏洞描述
–
时间线
2008-03-11 |
Unknow |
| Unknow | Unknow |




![[git]ssh: connect to host github.com port 22: Connection refused-微慑信息网-VulSee.com](https://vulsee.com/wp-content/uploads/2022/07/b3c61e49aaf0462ba352a14b1147617b.png)





![[八卦] 王婷婷—揭秘一个大三女生的性爱录像-微慑信息网-VulSee.com](http://free.86hy.com/crack/pic/1.jpg)
![[随笔]今天国际警察节-微慑信息网-VulSee.com](http://photo.sohu.com/20041017/Img222528326.jpg)

青云网
