微慑信息网

CVE-2008-2840-漏洞详情

CVE-2008-2840
CVSS 6.8
发布时间 :2008-06-24 15:41:00
修订时间 :2008-09-05 17:41:23
NMCO    

[原文]Multiple directory traversal vulnerabilities in Exero CMS 1.0.0 and 1.0.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the theme parameter to (1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, or (9) usercp/editpassword.php in themes/Default/. NOTE: some of these details are obtained from third party information.


[CNNVD]Exero CMS 多个目录遍历漏洞(CNNVD-200806-334)

        Exero CMS 1.0.0 和1.0.1中存在多个目录遍历漏洞,远程攻击者通过对(1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, 或 (9) themes/Default/中的usercp/editpassword.php的主体参数中的一个.. (dot dot),以包含和执行任意代码。


CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]


CWE (弱点类目)

CWE-22 [对路径名的限制不恰当(路径遍历)]


CPE (受影响的平台与产品)

cpe:/a:exerocms:exero_cms:1.0.1
cpe:/a:exerocms:exero_cms:1.0.0


OVAL (用于检测的技术细节)

未找到相关OVAL定义


官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2840

(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2840

(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200806-334

(官方数据源) CNNVD


其它链接及资源

http://www.securityfocus.com/bid/29788


(PATCH)  BID  29788
http://sourceforge.net/project/shownotes.php?release_id=607502


(UNKNOWN)  CONFIRM  http://sourceforge.net/project/shownotes.php?release_id=607502
http://secunia.com/advisories/30711


(VENDOR_ADVISORY)  SECUNIA  30711


漏洞信息

Exero CMS 多个目录遍历漏洞
中危 路径遍历
2008-06-24 00:00:00 2008-09-05 00:00:00
远程  
        Exero CMS 1.0.0 和1.0.1中存在多个目录遍历漏洞,远程攻击者通过对(1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, 或 (9) themes/Default/中的usercp/editpassword.php的主体参数中的一个.. (dot dot),以包含和执行任意代码。


公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:


        Exero CMS Exero CMS 1.0


        Exero CMS Exero_CMS-1.0.1.1.zip


        http://downloads.sourceforge.net/exerocms/Exero_CMS-1.0.1.1.zip?modtime=1213723950&big_mirror=0


漏洞信息


46242
Exero CMS custompage.php theme Parameter Traversal Local File Inclusion

Remote / Network Access

Input Manipulation
Loss of Integrity Upgrade
Vendor Verified


漏洞描述


时间线


2008-06-18

Unknow
Unknow Unknow


解决方案

Upgrade to version 1.0.1.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.


相关参考


漏洞作者

Unknown or Incomplete

赞(0) 打赏
转载请附本站链接,未经允许不得转载,,谢谢:微慑信息网-VulSee.com » CVE-2008-2840-漏洞详情

评论 抢沙发

微慑信息网 专注工匠精神

微慑信息网-VulSee.com-关注前沿安全态势,聚合网络安全漏洞信息,分享安全文档案例

访问我们联系我们

觉得文章有用就打赏一下文章作者

非常感谢你的打赏,我们将继续提供更多优质内容,让我们一起创建更加美好的网络世界!

支付宝扫一扫打赏

微信扫一扫打赏

登录

找回密码

注册