CVE-2005-3929 (CNNVD-200511-498)
中文标题:
Xaraya xarMLSXML2PHPBackend.php目录遍历漏洞
英文标题:
Directory traversal vulnerability in the create function in xarMLSXML2PHPBackend.php in Xaraya 1.0 a...
漏洞描述
中文描述:
Xaraya是Xaraya团队开发的一套开源的内容管理解决方案与开发框架,它包含了创建动态的跨平台内容管理系统所需要的基础模块和工具。 Xaraya的fopen()中存在文件破坏漏洞,可能导致拒绝服务。xarMLSXML2PHPBackend.php中的漏洞代码如下: ... function create($ctxType, $ctxName) { assert('!empty($this->baseDir)'); assert('!empty($this->baseXMLDir)'); $this->fileName = $this->baseDir; $this->xmlFileName = $this->baseXMLDir; if (!ereg("^[a-z]+:$", $ctxType)) { list($prefix,$directory) = explode(':',$ctxType); if ($directory != "") { $this->fileName .= $directory . "/"; $this->xmlFileName .= $directory . "/"; } } $dirForMkDir = $this->fileName; if (!file_exists($dirForMkDir)) xarMLS__mkdirr($dirForMkDir, 0777); $this->fileName .= $ctxName . ".php"; $this->xmlFileName .= $ctxName . ".xml"; $xmlFileExists = false; if (file_exists($this->xmlFileName)) { if (!($fp1 = fopen($this->xmlFileName, "r"))) { xarLogMessage("Could not open XML input: ".$this->xmlFileName); } $data = fread($fp1, filesize($this->xmlFileName)); fclose($fp1); $xml_parser = xml_parser_create(); xml_parse_into_struct($xml_parser, $data, $vals, $index); xml_parser_free($xml_parser); $xmlFileExists = true; } else { xarLogMessage("MLS Could not find XML input: ".$this->xmlFileName); } $fp2 = @fopen ($this->fileName, "w" ); if ($fp2 !== false) { fputs($fp2, '<?php'."\n"); fputs($fp2, 'global $xarML_PHPBackend_entries;'."\n"); fputs($fp2, 'global $xarML_PHPBackend_keyEntries;'."\n"); if ($xmlFileExists) { foreach ($vals as $node) { if (!array_key_exists('tag',$node)) continue; if (!array_key_exists('value',$node)) $node['value'] = ''; if ($node['tag'] == 'STRING') { $node['value'] = str_replace('\'', '\\\'', $node['value']); $start = '$xarML_PHPBackend_entries[\''.$node['value']."']"; } elseif ($node['tag'] == 'KEY') { $node['value'] = str_replace('\'', '\\\'', $node['value']); $start = \ '$xarML_PHPBackend_keyEntries[\''.$node['value']."']"; } elseif ($node['tag'] == \ 'TRANSLATION') { if ($this->outCharset != 'utf-8') { $node['value'] = \ $GLOBALS['xarMLS_newEncoding']->convert($node['value'], 'utf-8', $this->outCharset, \ 0); } $node['value'] = str_replace('\'', '\\\'', $node['value']); if (!empty($node['value'])) { fputs($fp2, $start . " = '".$node['value']."';\n"); } } } } fputs($fp2, "?>"); fclose($fp2); } else { xarLogMessage("Could not create file: ".$this->fileName); global $xarML_PHPBackend_entries; global $xarML_PHPBackend_keyEntries; if ($xmlFileExists) { foreach ($vals as $node) { if (!array_key_exists('tag',$node)) continue; if (!array_key_exists('value',$node)) $node['value'] = ''; if ($node['tag'] == 'STRING') { $node['value'] = str_replace('\'', '\\\'', $node['value']); $entryIndex = $node['value']; $entryType = 'string'; } elseif ($node['tag'] == 'KEY') { $node['value'] = str_replace('\'', '\\\'', $node['value']); $entryIndex = $node['value']; $entryType = 'key'; } elseif ($node['tag'] == 'TRANSLATION') { if ($this->outCharset != 'utf-8') { $node['value'] = \ $GLOBALS['xarMLS_newEncoding']->convert(
英文描述:
Directory traversal vulnerability in the create function in xarMLSXML2PHPBackend.php in Xaraya 1.0 allows remote attackers to create directories and overwrite arbitrary files via ".." sequences in the module parameter to index.php.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| xaraya | xaraya | 1.0_rc1 | - | - |
cpe:2.3:a:xaraya:xaraya:1.0_rc1:*:*:*:*:*:*:*
|
| xaraya | xaraya | 1.0_rc2 | - | - |
cpe:2.3:a:xaraya:xaraya:1.0_rc2:*:*:*:*:*:*:*
|
| xaraya | xaraya | 1.0_rc3 | - | - |
cpe:2.3:a:xaraya:xaraya:1.0_rc3:*:*:*:*:*:*:*
|
| xaraya | xaraya | 1.0_rc4 | - | - |
cpe:2.3:a:xaraya:xaraya:1.0_rc4:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:N/I:P/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-3929 |
2025-11-11 15:17:37 | 2025-11-11 07:32:29 |
| NVD | nvd_CVE-2005-3929 |
2025-11-11 14:51:20 | 2025-11-11 07:41:15 |
| CNNVD | cnnvd_CNNVD-200511-498 |
2025-11-11 15:08:49 | 2025-11-11 07:49:02 |
| EXPLOITDB | exploitdb_EDB-1345 |
2025-11-11 15:05:29 | 2025-11-11 08:06:10 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 8 -> 11
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-200511-498
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 4
- data_sources: ['cve'] -> ['cve', 'nvd']