Multiple Web Server ~nobody/ Request Arbitrary File Access

medium Nessus Plugin ID 10484

Synopsis

The remote web server is affected by an information disclosure vulnerability.

Description

It is possible to access arbitrary files on the remote web server by appending ~nobody/ in front of their name (as in ~nobody/etc/passwd).

This problem is due to a misconfiguration in the web server that sets 'UserDir' or its equivalent to './'.

Solution

If using Apache, set 'UserDir' to 'public_html/' or something else.

If using lighttpd, upgrade to version 1.4.19 or later.

Otherwise, contact the web server vendor.

Plugin Details

Severity: Medium

ID: 10484

File Name: httpd_nobody.nasl

Version: 1.21

Type: remote

Family: Web Servers

Published: 8/1/2000

Updated: 8/10/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Exploited by Nessus: true

Vulnerability Publication Date: 1/1/2000