LiteSpeed Web Server MIME Type Injection Null Byte Script Source Code Disclosure

medium Nessus Plugin ID 27523

Synopsis

The remote web server is affected by an information disclosure vulnerability.

Description

The remote host is running LiteSpeed Web Server, a high-performance web server.

The version of LiteSpeed Web Server installed on the remote host allows an attacker to view the contents of files due to a flaw in its handling of MIME types. By passing in a filename followed by a null byte and an extension, such as '.txt', a remote attacker can may be able to uncover sensitive information, such as credentials and host names contained in scripts, configuration files, etc.

Solution

Upgrade to LiteSpeed Web Server 3.2.4 or later.

See Also

https://www.litespeedtech.com/support/forum/threads/litespeed-3-2-4-has-been-release-to-address-a-security-flaw.1445/

http://www.nessus.org/u?1009f250

Plugin Details

Severity: Medium

ID: 27523

File Name: litespeed_web_server_null_source_disclosure.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 10/23/2007

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2007-5654

BID: 26163

CWE: 200