ht://Dig htsearch Multiple Vulnerabilities

medium Nessus Plugin ID 10784

Synopsis

The remote host contains a web search engine that is affected by multiple vulnerabilities.

Description

The remote CGI htsearch allows the user to supply his own configuration file using the '-c' switch, as in :

/cgi-bin/htsearch?-c/some/config/file

This file is not displayed by htsearch. However, if an attacker manages to upload a configuration file to the remote server, it may make htsearch read arbitrary files on the remote host.

An attacker may also use this flaw to exhaust the resources on the remote host by specifying /dev/zero as a configuration file.

Solution

Upgrade to ht://Dig 3.1.6 or newer.

See Also

ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2001-035.0.txt

http://www.nessus.org/u?f7ee9854

Plugin Details

Severity: Medium

ID: 10784

File Name: htsearch_config_switch.nasl

Version: 1.33

Type: remote

Family: CGI abuses

Published: 10/17/2001

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 9/3/2001

Reference Information

CVE: CVE-2001-0834

BID: 3410

DSA: 080

RHSA: 2001:139