NAI PGP Keyserver Web管理接口验证可绕过漏洞

漏洞信息详情

NAI PGP Keyserver Web管理接口验证可绕过漏洞

漏洞简介

PGP Keyserver是Network Associates的一个商业加密软件包,作为PGP公钥管理系统,提供LDAP特性。
PGP Keyserver存在一个漏洞,远程攻击者可以获得Web管理接口的管理权限。Web接口的管理员一般执行命令是通过如下链接:
http://www.example.com/keyserver/cgi-bin/console.exe?page_size=…
http://www.example.com/keyserver/cgi-bin/cs.exe?action=…
但是远程用户可以无需验证直接访问这些链接执行命令。恶意用户可以利用这个漏洞替换PGP Keyserver上的PGP密钥、获得系统的一些敏感信息以及对系统的合法用户进行拒绝服务攻击。

漏洞公告

临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* NAI提供了一个临时解决方法,参见http://www.pgp.com/support/product-advisories/keyserver.asp” target=”_blank”>
http://www.pgp.com/support/product-advisories/keyserver.asp

————————————————

# NT版本修改

————————————————

1) 找到httpd.conf文件(默认安装在 C:\Program Files\Network Associates\PGP Keyserver\Web\conf)如下小节:

#

# “C:/Program Files/Network Associates/PGP Keyserver/Web/cgi-bin” should be changed to whatever your ScriptAliased

# CGI directory exists, if you have that configured.

#

AllowOverride None

Options None

2) 改变成如下:

#

# “C:/Program Files/Network Associates/PGP Keyserver/Web/cgi-bin” should be changed to whatever your ScriptAliased

# CGI directory exists, if you have that configured.

#

AllowOverride None

Options None

Order allow,deny

require valid-user

AuthType Basic

AuthName “PGP Keyserver Administration”

AuthUserFile “C:/Program Files/Network Associates/PGP Keyserver/Web/.allowed-admin”

3) 重启Web服务器。

————————————————

SOLARIS版本修改

————————————————

1) 找到Solaris版本的httpd.conf文件 (默认安装在 /opt/PGPkeysrv/web/conf) 如下小节:

ScriptAlias /keyserver/cgi-bin/ “/opt/PGPkeysrv/web/cgi-bin/”

2) 在后面添加:

AllowOverride None

Options None

Order allow,deny

require valid-user

AuthType Basic

AuthName “protected area”

AuthUserFile /opt/PGPkeysrv/web/.allowed-admin

3) 限制只能从192.168.3网段地址才能访问:

AllowOverride None

Options None

require valid-user

AuthType Basic

AuthName “protected area”

AuthUserFile /opt/PGPkeysrv/web/.allowed-admin

# The default installation requires a login but is otherwise allowed

# from the world. To adjust this policy, read the apache documentation available

# at http://www.apache.org,” target=”_blank”>
http://www.apache.org, and remove or comment these lines:

# Order allow,deny

# allow from all

# and uncomment these lines:

Order deny,allow

Deny from all

# and use some variations of some of these lines.

# allow from a particular IP:

# allow from 192.168.3.4

# allow from a particular network:

allow from 192.168.3

# allow from a hostname:

# allow from fredsmachine.yourdomain.com

# allow from your entire domain:

# allow from .yourdomain.com

# allow from your subdomain:

# allow from .infotech.yourdomain.com

4) 添加必要的限制:

Order allow,deny

Allow from all

require valid-user

AuthType Basic

AuthName “PGP Keyserver Administration”

AuthUserFile “/opt/PGPkeysrv/web/.allowed-admin”

# use these lines for open access to directory utility.

# Order allow,deny

# Allow from all

# use these lines for closing access to directory utility:

Order deny,allow

Deny from all

# Use the model above or the Apache docs to add IP or domain-based restrictions.

allow from 192.168.3.4

Web服务器必须重启。
厂商补丁:
Network Associates
——————
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.pgp.com” target=”_blank”>
http://www.pgp.com

参考网址

来源: XF
名称: pgp-keyserver-http-dos(7203)
链接:http://www.iss.net/security_center/static/7203.php

来源: www.pgp.com
链接:http://www.pgp.com/support/product-advisories/keyserver.asp

来源: BID
名称: 3375
链接:http://www.securityfocus.com/bid/3375

来源: OSVDB
名称: 4193
链接:http://www.osvdb.org/4193

来源: OSVDB
名称: 1955
链接:http://www.osvdb.org/1955

来源: BUGTRAQ
名称: 20010928 SNS-43: PGP Keyserver Permissions Misconfiguration
链接:http://archives.neohapsis.com/archives/bugtraq/2001-09/0230.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享