Thunderstone Software TEXIS Nonexistent File Request Path Disclosure

medium Nessus Plugin ID 11401

Language:

Synopsis

A CGI application running on the remote host is affected by an information disclosure vulnerability.

Description

The Thunderstone Software TEXIS application running on the remote host is affected by an information disclosure vulnerability that allows an unauthenticated, remote attacker to obtain the full path of the web root directory by making a specially crafted request for a nonexistent file.

Solution

Upgrade Thunderstone Software TEXIS to the latest version.

See Also

https://seclists.org/bugtraq/2002/Feb/66

Plugin Details

Severity: Medium

ID: 11401

File Name: texis_path_disclosure.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 3/15/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:thunderstone_software:texis

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/5/2002

Reference Information

CVE: CVE-2002-0266

BID: 4035