| CVE-2008-2840 |
|
发布时间 :2008-06-24 15:41:00 | ||
| 修订时间 :2008-09-05 17:41:23 | ||||
| NMCO |
[原文]Multiple directory traversal vulnerabilities in Exero CMS 1.0.0 and 1.0.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the theme parameter to (1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, or (9) usercp/editpassword.php in themes/Default/. NOTE: some of these details are obtained from third party information.
[CNNVD]Exero CMS 多个目录遍历漏洞(CNNVD-200806-334)
Exero CMS 1.0.0 和1.0.1中存在多个目录遍历漏洞,远程攻击者通过对(1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, 或 (9) themes/Default/中的usercp/editpassword.php的主体参数中的一个.. (dot dot),以包含和执行任意代码。
–
CVSS (基础分值)
| CVSS分值: | 6.8 | [中等(MEDIUM)] |
| 机密性影响: | PARTIAL | [很可能造成信息泄露] |
| 完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
| 可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
| 攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
| 攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
| 身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
| CWE-22 | [对路径名的限制不恰当(路径遍历)] |
–
CPE (受影响的平台与产品)
| cpe:/a:exerocms:exero_cms:1.0.1 | |
| cpe:/a:exerocms:exero_cms:1.0.0 |
–
OVAL (用于检测的技术细节)
| 未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
|
http://www.securityfocus.com/bid/29788 (PATCH) BID 29788 |
|
http://sourceforge.net/project/shownotes.php?release_id=607502 (UNKNOWN) CONFIRM http://sourceforge.net/project/shownotes.php?release_id=607502 |
|
http://secunia.com/advisories/30711 (VENDOR_ADVISORY) SECUNIA 30711 |
–
漏洞信息
| Exero CMS 多个目录遍历漏洞 | |
| 中危 | 路径遍历 |
| 2008-06-24 00:00:00 | 2008-09-05 00:00:00 |
| 远程 | |
| Exero CMS 1.0.0 和1.0.1中存在多个目录遍历漏洞,远程攻击者通过对(1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, 或 (9) themes/Default/中的usercp/editpassword.php的主体参数中的一个.. (dot dot),以包含和执行任意代码。 | |
–
公告与补丁
|
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接: Exero CMS Exero CMS 1.0 Exero CMS Exero_CMS-1.0.1.1.zip http://downloads.sourceforge.net/exerocms/Exero_CMS-1.0.1.1.zip?modtime=1213723950&big_mirror=0 |
–
漏洞信息
46242 |
|
| Exero CMS custompage.php theme Parameter Traversal Local File Inclusion | |
Remote / Network Access |
Input Manipulation |
| Loss of Integrity | Upgrade |
| Vendor Verified | |
–
漏洞描述
–
时间线
2008-06-18 |
Unknow |
| Unknow | Unknow |
–
解决方案
| Upgrade to version 1.0.1.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds. |
–
相关参考
–
漏洞作者
| Unknown or Incomplete |




![[最新] [12月31日]08最新贺岁大片《叶问》DVD高清晰修正版-微慑信息网-VulSee.com](http://i3.6.cn/cvbnm/77/a8/df/e652cdeca1ee3633718d177c98fc55b8.jpg)



![[八卦] 王婷婷—揭秘一个大三女生的性爱录像-微慑信息网-VulSee.com](http://free.86hy.com/crack/pic/1.jpg)
![[随笔]今天国际警察节-微慑信息网-VulSee.com](http://photo.sohu.com/20041017/Img222528326.jpg)

青云网
