CVE-2000-0021
CVSS5.0
发布时间 :1999-12-01 00:00:00
修订时间 :2008-09-10 15:02:19
NMCOS    

[原文]Lotus Domino HTTP server allows remote attackers to determine the real path of the server via a request to a non-existent script in /cgi-bin.


[CNNVD]Lotus Notes Domino Webserver CGI漏洞(CNNVD-199912-002)

        Lotus Domino HTTP服务器存在漏洞。远程攻击者可以请求不存在的脚本in /cgi-bin获得真实路径。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0021
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0021
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199912-002
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/881
(UNKNOWN)  BID  881

- 漏洞信息

Lotus Notes Domino Webserver CGI漏洞
中危 未知
1999-12-01 00:00:00 2005-10-20 00:00:00
远程※本地  
        Lotus Domino HTTP服务器存在漏洞。远程攻击者可以请求不存在的脚本in /cgi-bin获得真实路径。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 漏洞信息

50
IBM Lotus Domino CGI Directory Path Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality Solution Unknown

- 漏洞描述

Lotus Domino HTTP Server contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a URL with a non-existent cgi-bin program is called, which will disclose the actual path information resulting in a loss of confidentiality.

- 时间线

1999-12-21 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): 1) If no CGI programs are needed, redirect the /cgi-bin directory to a notes database or html file. 2) If CGI programs are needed, change the CGI URL path under the HTTP section of the Server Document to a different URL path such as /scripts/cgi-bin. Then, under DOMCFG.NSF, create a URL document that specifies /cgi-bin as the incoming URL path and redirects it to /scripts/cgi-bin.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Lotus Notes Domino Webserver CGI Vulnerabilities
Unknown 881
Yes Yes
1999-12-21 12:00:00 2009-07-11 01:56:00
Posted to Bugtraq on Dec 21, 1999 by Alain Thivillon <Alain.Thivillon@hsc.fr>.

- 受影响的程序版本

Lotus Domino Server 4.6 .x
- Microsoft Windows NT 4.0
Lotus Domino Server 4.6
- Microsoft Windows NT 4.0

- 漏洞讨论

Three vulnerabilities have been discovered in the cgi handling done by Lotus Domino Server's Webserver component.

1: Path information can be obtained.

By submitting a request for a non-existant cgi, an attacker can determine the filesystem structure of the server. Example:
Requested URL:
http: //victimhost/cgi-bin/asdf
Response:
Error 500
Bad script request -- no variation of 'c:/notes/data/domino/cgi-bin/asdf' is executable

2: Anonymous access can not be disabled.

Even with anonymous access turned off on th eserver, it is still permitted for the cgi-bin directory.

3: Buffer overflow in cgi error handling

An overly long URL in a GET request, rooted in the cgi-bin directory, will crash the server. Not all long strings seem to work, but one that was tested and found to work was:
'GET /cgi-bin/[800 ','][4000 'a'] HTTP/1.0'

- 漏洞利用

see discussion

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站