Ãë¾àÁ¡ID |
21966 |
À§Çèµµ |
40 |
Æ÷Æ® |
80, ... |
ÇÁ·ÎÅäÄÝ |
TCP |
ºÐ·ù |
CGI |
»ó¼¼¼³¸í |
ÇØ´ç Gallery ¼ÒÇÁÆ®¿þ¾î´Â 'X_FORWARDED_FOR' HTTP header¸¦ ÅëÇÑ ´ÙÁßÀÇ Ãë¾àÁ¡µé¿¡ Ãë¾àÇÏ´Ù. Gallery´Â PHP·Î Á¦ÀÛµÈ À¥ ±â¹ÝÀÇ »çÁø ¾Ù¹ü ÇÁ·Î±×·¥ÀÌ´Ù. Gallery 2.0¿¡¼ 2.0.2±îÁöÀÇ ¹öÀüµéÀº ´ÙÀ½°ú °°Àº ´ÙÁßÀÇ Ãë¾àÁ¡µé¿¡ Ãë¾àÇÏ´Ù.
1) IP Spoofing : 'X_FORWARDED_FOR' Çì´õ·Î Àü´ÞµÈ ÀÔ·ÂÀÌ ÀûÀýÇÏ°Ô ÇÊÅ͸µµÇÁö ¾Ê´Â´Ù. ÀÌ´Â ¾Ù¹ü ³»¿¡ ÁÖ¼®µéÀÌ Ãß°¡µÉ ¶§ ·Î±×°¡ ³²´Â IP ÁÖ¼Ò¸¦ spoofÇÏ´Â µ¥ µµ¿ëµÉ ¼ö ÀÖ´Ù. 2) Cross-Site Scripting : 'getRemoteHostAddress()' ÇÔ¼ö·Î Àü´ÞµÈ ÀÔ·ÂÀÌ ÀûÀýÇÏ°Ô ÇÊÅ͸µµÇÁö ¾Ê´Â´Ù. ÀÌ´Â ¾ÇÀÇÀûÀÎ ÁÖ¼®ÀÌ º¸¿©Áú ¶§ ¿µÇâÀ» ¹Þ´Â »çÀÌÆ®ÀÇ È¯°æ ¾Æ·¡¿¡¼ »ç¿ëÀÚÀÇ ºê¶ó¿ìÀú¿¡¼ ÀÓÀÇÀÇ HTMLÀ̳ª ½ºÅ©¸³Æ® Äڵ带 ½ÇÇà Çϴµ¥ µµ¿ëµÉ ¼ö ÀÖ´Ù. 3) Security Bypass : session id ³»·Î Àü´ÞµÈ ÀÔ·ÂÀÌ »ç¿ëµÇ±â Àü¿¡ ÀûÀýÇÏ°Ô ÇÊÅ͸µµÇÁö ¾Ê´Â´Ù. ÀÌ´Â À¥ ¼¹ö ÇÁ·Î¼¼½ºµé¿¡ ÀÇÇØ »ç¿ëµÇ´Â ÀÓÀÇÀÇ ÆÄÀÏÀ» »èÁ¦ÇÏ´Â µ¥ µµ¿ëµÉ ¼ö ÀÖ´Ù.
* Âü°í »çÀÌÆ®: http://www.gulftech.org/?node=research&article_id=00106-03022006 http://www.securityfocus.com/archive/1/426655/30/0/threaded http://secunia.com/advisories/19104/ http://securitytracker.com/id?1015717 http://archives.neohapsis.com/archives/bugtraq/2006-02/0621.html
* ¿µÇâÀ» ¹Þ´Â Ç÷§Æû: Bharat Mediratta, Gallery 2.0¿¡¼ 2.0.2±îÁöÀÇ ¹öÀüµé ¸ðµç ¿î¿µÃ¼Á¦ ¸ðµç ¹öÀü |
ÇØ°áÃ¥ |
Gallery ProjectÀÇ À¥ ÆäÀÌÁöÀÎ http://gallery.menalto.com/ ¿¡¼ ±¸ÇÒ ¼ö ÀÖ´Â GalleryÀÇ °¡Àå ÃֽŠ¹öÀü(2.0.3 ȤÀº ÀÌÈÄ)À¸·Î ¾÷±×·¹À̵å ÇÏ¿©¾ß ÇÑ´Ù. |
°ü·Ã URL |
CVE-2006-1126,CVE-2006-1127,CVE-2006-1128 (CVE) |
°ü·Ã URL |
16940,16948 (SecurityFocus) |
°ü·Ã URL |
25117,25118,25120 (ISS) |
|