Netscape FastTrack get Command Forced Directory Listing

Medium Nessus Plugin ID 10156


The remote web server is vulnerable to an information disclosure attack.


When the remote web server is issued a request with a lower-case 'get', it will return a directory listing even if a default page such as index.html is present. For example :
get / HTTP/1.0

will return a listing of the root directory.

This allows an attacker to gain valuable information about the directory structure of the remote host and could reveal the presence of files that are not intended to be visible.


Upgrade the server to the latest version.

Plugin Details

Severity: Medium

ID: 10156

File Name: netscape_fasttrack.nasl

Version: $Revision: 1.35 $

Type: remote

Family: Web Servers

Published: 1999/06/22

Modified: 2016/08/29

Dependencies: 10582, 10107, 17975

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:netscape:fasttrack_server

Required KB Items: www/netscape-fasttrack

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1998/01/16

Reference Information

CVE: CVE-1999-0239

BID: 481

OSVDB: 122