NaviCOPA Trailing Dot Source Code Disclosure

medium Nessus Plugin ID 35588

Synopsis

The remote web server is affected by an information disclosure vulnerability.

Description

The version of the NaviCOPA web server software running on the remote host returns the source of scripts hosted on it if the URL ends in a dot ('.'). A remote attacker can leverage this issue to view the source code of CGIs and possibly obtain passwords and other sensitive information from this host.

Solution

Upgrade to NaviCOPA 3.01 from 6th February 2009 or later as that reportedly addresses the issue.

See Also

https://www.securityfocus.com/archive/1/500626/30/0/threaded

Plugin Details

Severity: Medium

ID: 35588

File Name: navicopa_source.nasl

Version: 1.12

Type: remote

Family: Web Servers

Published: 2/5/2009

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Reference Information

BID: 33585

Secunia: 33766