Dwarf HTTP Server < 1.3.3 Multiple Remote Vulnerabilities (XSS, Disc)

high Nessus Plugin ID 21092

Synopsis

The remote web server suffers from multiple flaws.

Description

The remote host is running Dwarf HTTP Server, a full-featured, Java-based web server.

According to its banner, the version of Dwarf HTTP Server on the remote host reportedly fails to properly validate filename extensions in URLs. A remote attacker may be able to leverage this issue to disclose the source of scripts hosted by the affected application using specially crafted requests with dot, space, slash, and NULL characters.

In addition, the web server also reportedly fails to sanitize requests before returning error pages, which can be exploited to conduct cross-site scripting attacks.

Solution

Upgrade to Dwarf HTTP Server version 1.3.3 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2006-13/advisory/

Plugin Details

Severity: High

ID: 21092

File Name: dwarf_http_133.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 3/17/2006

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 3/13/2006

Reference Information

CVE: CVE-2006-0819, CVE-2006-0820

BID: 17123

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990