Blahz-DNS直接脚本调用验证可绕过漏洞

Blahz-DNS直接脚本调用验证可绕过漏洞

漏洞ID 1106707 漏洞类型 未知
发布时间 2002-04-28 更新时间 2005-05-02
图片[1]-Blahz-DNS直接脚本调用验证可绕过漏洞-安全小百科CVE编号 CVE-2002-0599
图片[2]-Blahz-DNS直接脚本调用验证可绕过漏洞-安全小百科CNNVD-ID CNNVD-200206-039
漏洞平台 PHP CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/21426
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200206-039
|漏洞详情
Blahz-DNS是一款基于WEB的DNS信息管理工具,由PHP语言实现,可使用在Linux操作系统下。Blahz-DNS验证处理中存在漏洞,可导致远程攻击者绕过验证机制以管理员权限访问系统。Blahz-DNS只对登录页面实现验证处理,需要用户提供用户名和密码,攻击者可以通过直接调用Blahz-DNS中的其他脚本,就能绕过验证检查,无需密码以管理员权限全局访问Blahz-DNS所有功能如增加用户,改变用户等。
|漏洞EXP
source: http://www.securityfocus.com/bid/4618/info

Blahz-DNS is a web based management tool for DNS information. It is implemented in PHP, and available for Linux systems.

By directly calling scripts included with Blahz-DNS, it is possible to bypass the authentication check, gaining full access to the Blahz-DNS tool.

http://www.example.com/dostuff.php?action=modify_user
|参考资料

来源:BID
名称:4618
链接:http://www.securityfocus.com/bid/4618
来源:XF
名称:blahzdns-auth-bypass(8951)
链接:http://www.iss.net/security_center/static/8951.php
来源:BUGTRAQ
名称:20020428Blahz-DNS:Authenticationbypassvulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2002-04/0395.html
来源:sourceforge.net
链接:http://sourceforge.net/project/shownotes.php?release_id=87004
来源:OSVDB
名称:5178
链接:http://www.osvdb.org/5178

相关推荐: Qualcomm Eudora Spoofed Attachment Line Denial Of Service Vulnerability

Qualcomm Eudora Spoofed Attachment Line Denial Of Service Vulnerability 漏洞ID 1099312 漏洞类型 Failure to Handle Exceptional Conditions…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享