CERN httpd Virtual Web Path Disclosure

medium Nessus Plugin ID 10037

Synopsis

The remote web server has an information disclosure vulnerability.

Description

The remote host appears to be running CERN httpd. It was possible to get the physical location of a virtual web directory by issuing the request :

GET /cgi-bin/ls HTTP/1.0

A remote attacker could use this information to mount further attacks.

Solution

CERN httpd is no longer maintained. Switch to using an actively supported web server.

See Also

http://www.nessus.org/u?76c8a7f2

Plugin Details

Severity: Medium

ID: 10037

File Name: cern_httpd_path.nasl

Version: 1.33

Type: remote

Family: Web Servers

Published: 1/20/2000

Updated: 7/2/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/cern

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/18/2000

Exploitable With

Core Impact

Reference Information

CVE: CVE-2000-0079

BID: 936