Inktomi Search MS-DOS Device Name Request Path Disclosure

medium Nessus Plugin ID 12300

Synopsis

The remote web server is hosting an application that is affected by an information disclosure vulnerability.

Description

This web server is running a vulnerable version of Verity Ultraseek (formerly Inktomi Search).

Certain requests using MS-DOS special file names such as NUL can cause a python error. The error message contains sensitive information such as the physical path of the webroot. This information may be useful to an attacker.

Solution

Upgrade to Verity Ultraskeek 5.2.2 or later.

See Also

https://www.corsaire.com/404/

Plugin Details

Severity: Medium

ID: 12300

File Name: inktomi_path_disclosure.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 7/6/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 5/5/2004

Reference Information

CVE: CVE-2004-0050

BID: 10275, 8050