Hi, Discovered vulnerability in an old version of Inktomi Search, requests using MS-DOS special file names such as nul can cause a python error which contain physical path of the webroot. The vulnerability has been fixed in most recent version. I have attached the test. Regards -- Sarju Bhagat Software Engineer Westpoint Limited Albion Wharf, 19 Albion Street, Manchester, M1 5LN England Tel: +44 (0)161 237 1028 Fax: +44 (0)161 237 1031 email: sarju@private web: www.westpoint.ltd.uk # # This script was written by Sarju Bhagat <sarju@private> # # See the Nessus Scripts License for details # if(description) { script_id(90008); script_bugtraq_id(8050); name["english"] = "Inktomi Search Physical Path Disclosure"; script_name(english:name["english"]); script_version ("$Revision: 1.0 $"); desc["english"] = " This web server is running a vulnerable version of Inktomi Search Certain requests using MS-DOS special file names such as nul can cause a python error. The error message contains sensitive information such as the physical path of the webroot. This information may be useful to an attacker. Solution : Upgrade to the latest version. This product is now devloped by Verity and is called Ultraseek Risk factor : Low"; script_description(english:desc["english"]); summary["english"] = "Checks for a Inktomi Search vulnerability"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004 Westpoint Limited", francais:"Ce script est Copyright (C) 2004 Westpoint Limited"); family["english"] = "CGI abuses"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("find_service.nes"); script_require_ports("Services/www", 8765); exit(0); } include("http_func.inc"); include("http_keepalive.inc"); # # The script code starts here # port = get_http_port(default:8765); if(!get_port_state(port))exit(0); req = http_get(item:"/nul", port:port); res = http_keepalive_send_recv(port:port, data:req); webroot = egrep(pattern:"directory", string:res); if(webroot) { webroot = ereg_replace(string:webroot, pattern:"^.*'(.*)'.*$", replace:"\1"); report = " This web server is running a vulnerable version of Inktomi Search Certain requests using MS-DOS special file names such as nul can cause a python error. The error message contains sensitive information such as the physical path of the webroot. This information may be useful to an attacker. The remote web root is : " + webroot + " Solution : Upgrade to the latest version. This product is now devloped by Verity and is called Ultraseek Risk factor : Low"; security_warning(port:port, data:report); } _______________________________________________ Plugins-writers mailing list Plugins-writers@private http://mail.nessus.org/mailman/listinfo/plugins-writers
This archive was generated by hypermail 2.1.3 : Tue Jul 06 2004 - 03:57:16 PDT