ID

VAR-200205-0029


CVE

CVE-2002-0232


TITLE

MRTG CGI Remotely read arbitrary file vulnerabilities

Trust: 0.6

sources: CNNVD: CNNVD-200205-109

DESCRIPTION

Directory traversal vulnerability in Multi Router Traffic Grapher (MRTG) allows remote attackers to read portions of arbitrary files via a .. (dot dot) in the cfg parameter for (1) 14all.cgi, (2) 14all-1.1.cgi, (3) traffic.cgi, or (4) mrtg.cgi. This can be accomplished by specifying a relative path and file name in a query string passed to the scripts via a properly constructed URL. The scripts reported to be vulnerable include mrtg.cgi, traffic.cgi, 14all-1.1.cgi, and 14all.cgi. An example URL is: http://somehost/mrtg.cgi?cfg=../../../../../../../../etc/passwd. All affected scripts are reportedly exploited with the same query string. (ie, the "cfg=" variable). Multi Router Traffic Grapher is a software that monitors traffic on network nodes. MRTG generates HTML pages containing GIF animations to represent a graphic representation of network traffic at that time. There is an input verification error in the implementation of the MRTG CGI program, and a remote attacker can use this vulnerability to browse any file that has permission to read on the host. The problem is that some CGI scripts of MRTG do not fully filter the user input. A remote attacker can traverse the directory on the host by inserting \"../\" into the input, and read any web process that has permission to read. document. The script programs affected by this vulnerability are mrtg.cgi, traffic.cgi, 14all-1.1.cgi and 14all.cgi, all of them use \"cfg\" variable, for example http://somehost/mrtg.cgi?cfg= ../../../../../../../../etc/passwd

Trust: 1.26

sources: NVD: CVE-2002-0232 // BID: 4017 // VULHUB: VHN-4625

AFFECTED PRODUCTS

vendor:mrtgmodel:multi router traffic grapher cgiscope:eqversion:2.9.17

Trust: 1.6

vendor:mrtgmodel:multi router traffic grapher cgi -win32scope:eqversion:2.9.17

Trust: 0.3

vendor:mrtgmodel:multi router traffic grapher cgi -unixscope:eqversion:2.9.17

Trust: 0.3

sources: BID: 4017 // CNNVD: CNNVD-200205-109 // NVD: CVE-2002-0232

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0232
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200205-109
value: MEDIUM

Trust: 0.6

VULHUB: VHN-4625
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-0232
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4625
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4625 // CNNVD: CNNVD-200205-109 // NVD: CVE-2002-0232

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0232

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200205-109

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200205-109

EXTERNAL IDS

db:BIDid:4017

Trust: 2.0

db:NVDid:CVE-2002-0232

Trust: 2.0

db:CNNVDid:CNNVD-200205-109

Trust: 0.7

db:BUGTRAQid:20020202 NEW ADVISORY

Trust: 0.6

db:XFid:8062

Trust: 0.6

db:VULHUBid:VHN-4625

Trust: 0.1

sources: VULHUB: VHN-4625 // BID: 4017 // CNNVD: CNNVD-200205-109 // NVD: CVE-2002-0232

REFERENCES

url:http://www.securityfocus.com/bid/4017

Trust: 1.7

url:http://www.iss.net/security_center/static/8062.php

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=101266821909189&w=2

Trust: 1.0

url:http://marc.theaimsgroup.com/?l=bugtraq&m=101266821909189&w=2

Trust: 0.6

url:http://www.mrtg.org

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=101266821909189&w=2

Trust: 0.1

sources: VULHUB: VHN-4625 // BID: 4017 // CNNVD: CNNVD-200205-109 // NVD: CVE-2002-0232

CREDITS

UkR-XblP※ cuctema@ok.ru

Trust: 0.6

sources: CNNVD: CNNVD-200205-109

SOURCES

db:VULHUBid:VHN-4625
db:BIDid:4017
db:CNNVDid:CNNVD-200205-109
db:NVDid:CVE-2002-0232

LAST UPDATE DATE

2025-04-03T22:30:56.134000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4625date:2016-10-18T00:00:00
db:BIDid:4017date:2009-07-11T09:56:00
db:CNNVDid:CNNVD-200205-109date:2005-10-20T00:00:00
db:NVDid:CVE-2002-0232date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-4625date:2002-05-29T00:00:00
db:BIDid:4017date:2002-02-02T00:00:00
db:CNNVDid:CNNVD-200205-109date:2002-02-04T00:00:00
db:NVDid:CVE-2002-0232date:2002-05-29T04:00:00