ID

VAR-E-199909-0099


CVE

cve_id:CVE-1999-0236

Trust: 1.6

sources: EXPLOIT-DB: 20595 // EDBNET: 42735

EDB ID

20595


TITLE

NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval - Multiple remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 20595

DESCRIPTION

NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval. CVE-1999-0236CVE-1745 . remote exploit for Multiple platform

Trust: 0.6

sources: EXPLOIT-DB: 20595

AFFECTED PRODUCTS

vendor:ncsamodel:apache httpdscope:eqversion:1.3/1.4.x/1.5/0.8.11/0.8.14

Trust: 1.0

vendor:ncsamodel:httpd a-exportscope:eqversion:1.5

Trust: 0.3

vendor:ncsamodel:httpdscope:eqversion:1.4.2

Trust: 0.3

vendor:ncsamodel:httpdscope:eqversion:1.4.1

Trust: 0.3

vendor:ncsamodel:httpdscope:eqversion:1.4

Trust: 0.3

vendor:ncsamodel:httpdscope:eqversion:1.3

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:0.8.14

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:0.8.11

Trust: 0.3

vendor:apachemodel:apachescope:neversion:1.0

Trust: 0.3

sources: BID: 2300 // EXPLOIT-DB: 20595

EXPLOIT

source: https://www.securityfocus.com/bid/2300/info

NSCA httpd prior to and including 1.5 and Apache Web Server prior to 1.0 contain a bug in the ScriptAlias function that allows remote users to view the source of CGI programs on the web server, if a ScriptAlias directory is defined under DocumentRoot. A full listing of the CGI-BIN directory can be obtained if indexing is turned on, as well. This is accomplished by adding multiple forward slashes in the URL (see exploit). The web server fails to recognize that a ScriptAlias directory is actually redirected to a CGI directory when this syntax is used, and returns the text of the script instead of properly executing it. This may allow an attacker to audit scripts for vulnerabilities, retrieve proprietary information, etc.

To retrieve the contents of http://targethost/cgi-bin/script.cgi an attacker would use the following URL, provided the directory cgi-bin is redirected using ScriptAlias:
http://targethost///cgi-bin/script.cgi

Trust: 1.0

sources: EXPLOIT-DB: 20595

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 20595

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 20595

TYPE

ScriptAlias Source Retrieval

Trust: 1.0

sources: EXPLOIT-DB: 20595

CREDITS

anonymous

Trust: 0.6

sources: EXPLOIT-DB: 20595

EXTERNAL IDS

db:BIDid:2300

Trust: 1.9

db:NVDid:CVE-1999-0236

Trust: 1.6

db:EXPLOIT-DBid:20595

Trust: 1.6

db:EDBNETid:42735

Trust: 0.6

sources: BID: 2300 // EXPLOIT-DB: 20595 // EDBNET: 42735

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-1999-0236

Trust: 1.6

url:https://www.securityfocus.com/bid/2300/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/20595/

Trust: 0.6

url:http://www.csupomona.edu/~fgallegos/cis433/152.html

Trust: 0.3

url:http://www.guard.dubna.ru/cgibug.html

Trust: 0.3

url:http://www.chemistry.ohio-state.edu/support/compsupp/private/iss/doc/vuln_catalog.html#http-scriptalias

Trust: 0.3

sources: BID: 2300 // EXPLOIT-DB: 20595 // EDBNET: 42735

SOURCES

db:BIDid:2300
db:EXPLOIT-DBid:20595
db:EDBNETid:42735

LAST UPDATE DATE

2022-07-27T09:55:55.054000+00:00


SOURCES UPDATE DATE

db:BIDid:2300date:1999-09-25T00:00:00

SOURCES RELEASE DATE

db:BIDid:2300date:1999-09-25T00:00:00
db:EXPLOIT-DBid:20595date:1999-09-25T00:00:00
db:EDBNETid:42735date:1999-09-25T00:00:00