Netscape FastTrack get Command Forced Directory Listing

medium Nessus Plugin ID 10156

Synopsis

The remote web server is vulnerable to an information disclosure attack.

Description

When the remote web server is issued a request with a lower-case 'get', it will return a directory listing even if a default page such as index.html is present. For example :
get / HTTP/1.0

will return a listing of the root directory.

This allows an attacker to gain valuable information about the directory structure of the remote host and could reveal the presence of files that are not intended to be visible.

Solution

Upgrade the server to the latest version.

Plugin Details

Severity: Medium

ID: 10156

File Name: netscape_fasttrack.nasl

Version: 1.37

Type: remote

Family: Web Servers

Published: 6/22/1999

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:netscape:fasttrack_server

Required KB Items: www/netscape-fasttrack

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/16/1998

Reference Information

CVE: CVE-1999-0239

BID: 481