Spooky! I had just cut a nasl script for this last week. The vuln has already been identified and released as: http://www.corsaire.com/advisories/c040113-001.txt Additionally, sending dos device names to some web engines will cause a DOS condition (such as older versions of the Compaq web agent), so we concluded that the test needed to have some kind of pre-check to ensure that the platform is Inktomi/Ultraseek before sending the /nul test. Alternative script attached. Regards, Martin O'Neal -----Original Message----- From: plugins-writers-bounces@private [mailto:plugins-writers-bounces@private] On Behalf Of Sarju Bhagat Sent: 06 July 2004 11:39 To: deraison@private Cc: plugins-writers@private Subject: [Plugins-writers] Inktomi Search Vulnerability Hi, Discovered vulnerability in an old version of Inktomi Search, requests using MS-DOS special file names such as nul can cause a python error which contain physical path of the webroot. The vulnerability has been fixed in most recent version. I have attached the test. Regards -- Sarju Bhagat Software Engineer Westpoint Limited Albion Wharf, 19 Albion Street, Manchester, M1 5LN England Tel: +44 (0)161 237 1028 Fax: +44 (0)161 237 1031 email: sarju@private web: www.westpoint.ltd.uk
_______________________________________________ Plugins-writers mailing list Plugins-writers@private http://mail.nessus.org/mailman/listinfo/plugins-writers
This archive was generated by hypermail 2.1.3 : Tue Jul 06 2004 - 06:42:48 PDT