Netscape Communicator和Navigator文件泄露漏洞

Netscape Communicator和Navigator文件泄露漏洞

漏洞ID 1105952 漏洞类型 未知
发布时间 2000-08-03 更新时间 2005-10-12
图片[1]-Netscape Communicator和Navigator文件泄露漏洞-安全小百科CVE编号 CVE-2000-0676
图片[2]-Netscape Communicator和Navigator文件泄露漏洞-安全小百科CNNVD-ID CNNVD-200010-022
漏洞平台 Multiple CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20140
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200010-022
|漏洞详情
NetscapeCommunicator和Navigator4.04到4.74版本存在漏洞。远程攻击者可以通过使用Java程序打开使用“file”,“http”,“https”,和“ftp”协议的URL连接读取任意文件,正如BrownOrifice。
|漏洞EXP
source: http://www.securityfocus.com/bid/1546/info

A flaw in Netscape Communicator's implementation of Java allows malicious applets to read any resource reachable via a URL from the local machine by using the netscape.net.URLConnection and netscape.net.URLInputSteam classes. This allows malicious applets to read local files as well as download data from hosts that would otherwise could be protected by a firewall.

An untrusted applet normally is no allowed to read or write to the local file system, or to open network connections to any machine other than that from which it was downloaded.. Security sensitive classes such as FileInputStream() , RandomAccessFile(), or Socket() normally check whether a class can read from a local file by calling the SecurityManager.checkRead() method or whether it connect to other hosts by calling the SecurityManager.checkConnect() method.

Netscape's netscape.net.URLConnection and netscape.net.URLInputStream classes seem to ignore or not perform these checks when passed an URLs. Thus malicious classes and read local files using URLs of the type "file://".

If the machine running the malicious applet is behind a firewall it will also be able to download resources that can be accessed via a URL, such as web server ("http://" or "https://) or FTP servers ("ftp://"), that the attacker in control of the machine from which the applet was downloaded could not. In this way a malicious applet could be used to penetrate a firewall. 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20140.tar.gz
|参考资料

来源:CERT/CCAdvisory:CA-2000-15
名称:CA-2000-15
链接:http://www.cert.org/advisories/CA-2000-15.html
来源:BID
名称:1546
链接:http://www.securityfocus.com/bid/1546
来源:REDHAT
名称:RHSA-2000:054
链接:http://www.redhat.com/support/errata/RHSA-2000-054.html
来源:SUSE
名称:20000823SecurityHoleinNetscape,Versions4.x,possiblyothers
链接:http://www.novell.com/linux/security/advisories/suse_security_announce_60.html
来源:CALDERA
名称:CSSA-2000-027.1
链接:http://www.calderasystems.com/support/security/advisories/CSSA-2000-027.1.txt
来源:BUGTRAQ
名称:20000821MDKSA-2000:036-netscapeupdate
链接:http://archives.neohapsis.com/archives/bugtraq/2000-08/0265.html
来源:BUGTRAQ
名称:20000818ConectivaLinuxSecurityAnnouncement-netscape
链接:http://archives.neohapsis.com/archives/bugtraq/2000-08/0236.html
来源:BUGTRAQ
名称:20000810MDKSA-2000:033NetscapeJavavulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2000-08/0115.html
来源:BUGTRAQ
名称:20000804DangerousJava/NetscapeSecurityHole
链接:http://archives.neohapsis.com/archives/bugtraq/2000-08/00

相关推荐: PHPSlash URL块任意文件泄露漏洞

PHPSlash URL块任意文件泄露漏洞 漏洞ID 1106302 漏洞类型 输入验证 发布时间 2001-04-15 更新时间 2005-05-02 CVE编号 CVE-2001-1334 CNNVD-ID CNNVD-200205-048 漏洞平台 PH…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享