漏洞信息详情
NAI PGP Keyserver Web管理接口验证可绕过漏洞
- CNNVD编号:CNNVD-200109-134
- 危害等级: 超危
- CVE编号:
CVE-2001-1252
- 漏洞类型:
配置错误
- 发布时间:
2001-09-28
- 威胁类型:
远程
- 更新时间:
2006-09-22
- 厂 商:
pgp - 漏洞来源:
Nobuo Miwa※ snsadv… -
漏洞简介
PGP Keyserver是Network Associates的一个商业加密软件包,作为PGP公钥管理系统,提供LDAP特性。
PGP Keyserver存在一个漏洞,远程攻击者可以获得Web管理接口的管理权限。Web接口的管理员一般执行命令是通过如下链接:
http://www.example.com/keyserver/cgi-bin/console.exe?page_size=…
http://www.example.com/keyserver/cgi-bin/cs.exe?action=…
但是远程用户可以无需验证直接访问这些链接执行命令。恶意用户可以利用这个漏洞替换PGP Keyserver上的PGP密钥、获得系统的一些敏感信息以及对系统的合法用户进行拒绝服务攻击。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
* NAI提供了一个临时解决方法,参见http://www.pgp.com/support/product-advisories/keyserver.asp” target=”_blank”>
http://www.pgp.com/support/product-advisories/keyserver.asp
————————————————
# NT版本修改
————————————————
1) 找到httpd.conf文件(默认安装在 C:\Program Files\Network Associates\PGP Keyserver\Web\conf)如下小节:
#
# “C:/Program Files/Network Associates/PGP Keyserver/Web/cgi-bin” should be changed to whatever your ScriptAliased
# CGI directory exists, if you have that configured.
#
AllowOverride None
Options None
2) 改变成如下:
#
# “C:/Program Files/Network Associates/PGP Keyserver/Web/cgi-bin” should be changed to whatever your ScriptAliased
# CGI directory exists, if you have that configured.
#
AllowOverride None
Options None
Order allow,deny
require valid-user
AuthType Basic
AuthName “PGP Keyserver Administration”
AuthUserFile “C:/Program Files/Network Associates/PGP Keyserver/Web/.allowed-admin”
3) 重启Web服务器。
————————————————
SOLARIS版本修改
————————————————
1) 找到Solaris版本的httpd.conf文件 (默认安装在 /opt/PGPkeysrv/web/conf) 如下小节:
ScriptAlias /keyserver/cgi-bin/ “/opt/PGPkeysrv/web/cgi-bin/”
2) 在后面添加:
AllowOverride None
Options None
Order allow,deny
require valid-user
AuthType Basic
AuthName “protected area”
AuthUserFile /opt/PGPkeysrv/web/.allowed-admin
3) 限制只能从192.168.3网段地址才能访问:
AllowOverride None
Options None
require valid-user
AuthType Basic
AuthName “protected area”
AuthUserFile /opt/PGPkeysrv/web/.allowed-admin
# The default installation requires a login but is otherwise allowed
# from the world. To adjust this policy, read the apache documentation available
# at http://www.apache.org,” target=”_blank”>
http://www.apache.org, and remove or comment these lines:
# Order allow,deny
# allow from all
# and uncomment these lines:
Order deny,allow
Deny from all
# and use some variations of some of these lines.
# allow from a particular IP:
# allow from 192.168.3.4
# allow from a particular network:
allow from 192.168.3
# allow from a hostname:
# allow from fredsmachine.yourdomain.com
# allow from your entire domain:
# allow from .yourdomain.com
# allow from your subdomain:
# allow from .infotech.yourdomain.com
4) 添加必要的限制:
Order allow,deny
Allow from all
require valid-user
AuthType Basic
AuthName “PGP Keyserver Administration”
AuthUserFile “/opt/PGPkeysrv/web/.allowed-admin”
# use these lines for open access to directory utility.
# Order allow,deny
# Allow from all
# use these lines for closing access to directory utility:
Order deny,allow
Deny from all
# Use the model above or the Apache docs to add IP or domain-based restrictions.
allow from 192.168.3.4
Web服务器必须重启。
厂商补丁:
Network Associates
——————
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.pgp.com” target=”_blank”>
http://www.pgp.com
参考网址
来源: XF
名称: pgp-keyserver-http-dos(7203)
链接:http://www.iss.net/security_center/static/7203.php
来源: www.pgp.com
链接:http://www.pgp.com/support/product-advisories/keyserver.asp
来源: BID
名称: 3375
链接:http://www.securityfocus.com/bid/3375
来源: OSVDB
名称: 4193
链接:http://www.osvdb.org/4193
来源: OSVDB
名称: 1955
链接:http://www.osvdb.org/1955
来源: BUGTRAQ
名称: 20010928 SNS-43: PGP Keyserver Permissions Misconfiguration
链接:http://archives.neohapsis.com/archives/bugtraq/2001-09/0230.html