BadBlue ISAPI extension绕过认证漏洞

BadBlue ISAPI extension绕过认证漏洞

漏洞ID 1107336 漏洞类型 未知
发布时间 2003-05-20 更新时间 2003-06-09
图片[1]-BadBlue ISAPI extension绕过认证漏洞-安全小百科CVE编号 CVE-2003-0332
图片[2]-BadBlue ISAPI extension绕过认证漏洞-安全小百科CNNVD-ID CNNVD-200306-040
漏洞平台 Windows CVSS评分 7.6
|漏洞来源
https://www.exploit-db.com/exploits/22620
https://www.securityfocus.com/bid/87152
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200306-040
|漏洞详情
从BadBlue1.7到2.2版本,和可能之前版本的ISAPIextension执行安全检查后修改文件扩展名首两个字母。远程攻击者借助具有.ats扩展名而不是.hts扩展名绕过认证。
|漏洞EXP
source: http://www.securityfocus.com/bid/7638/info

BadBlue is prone to a vulnerability that could allow remote attackers to gain unauthorized access to administrative functions.

It is possible to bypass BadBlue security checks when '.hts' files are requested by a remote user. BadBlue restricts access to non-HTML files by replacing the first two letters in the file extension of a requested resource with 'ht'. If the third character of a file extension is 's', then it is possible to trick BadBlue into serving a non-HTML file with an extension of '.hts'. This will bypass other security checks which would normally prevent BadBlue from serving these files to remote users.

http://www.example.com/ext.dll?mfcisapicommand=loadpage&page=admin.ats&a0=add&a1=root&a2=%5C

This example will reveal the contents of the server's primary volume.
|受影响的产品
Working Resources Inc. BadBlue 2.2
|参考资料

来源:VULNWATCH
名称:20030520BadBlueRemoteAdministrativeInterfaceAccessVulnerability
链接:http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0075.html
来源:BUGTRAQ
名称:20030520BadBlueRemoteAdministrativeInterfaceAccessVulnerability
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=105346382524169&w;=2

相关推荐: Greg Matthews – ‘Classifieds.cgi’ 1.0 Hidden Variable

Greg Matthews – ‘Classifieds.cgi’ 1.0 Hidden Variable 漏洞ID 1105387 漏洞类型 发布时间 1998-12-15 更新时间 1998-12-15 CVE编号 CVE-1999-0935 CNNVD-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享