发布时间 :2004-06-14 00:00:00
修订时间 :2017-07-10 21:29:52

[原文]Verity Ultraseek before 5.2.2 allows remote attackers to obtain the full pathname of the document root via an MS-DOS device name in the web search option, such as (1) NUL, (2) CON, (3) AUX, (4) COM1, (5) COM2, and others.

[CNNVD]Verity Ultraseek错误信息路径公开漏洞(CNNVD-200406-045)

        Verity Ultraseek 5.2.2之前的版本存在漏洞。远程攻击者借助web搜寻选项的MS-DOS设备名获得文档根的完全路径名,设备名称如(1)NUL,(2)CON,(3)AUX,(4)COM1,(5) COM2以及其他的。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  VULNWATCH  20040505 Corsaire Security Advisory - Verity Ultraseek path disclosure issue
(UNKNOWN)  FULLDISC  20040505 Corsaire Security Advisory - Verity Ultraseek path disclosure issue
(UNKNOWN)  BUGTRAQ  20040505 Corsaire Security Advisory - Verity Ultraseek path disclosure issue
(UNKNOWN)  XF  ultraseek-error-path-disclosure(16066)

- 漏洞信息

Verity Ultraseek错误信息路径公开漏洞
中危 输入验证
2004-06-14 00:00:00 2005-10-20 00:00:00
        Verity Ultraseek 5.2.2之前的版本存在漏洞。远程攻击者借助web搜寻选项的MS-DOS设备名获得文档根的完全路径名,设备名称如(1)NUL,(2)CON,(3)AUX,(4)COM1,(5) COM2以及其他的。

- 公告与补丁

        Verity has released Ultraseek 5.2.2 to address this issue. Please contact the vendor to obtain a fixed version.

- 漏洞信息 (F33254)

verity.txt (PacketStormID:F33254)
2004-05-07 00:00:00
Martin O'Neal  

Verity Ultraseek versions 5.2.1 and below suffer from a path disclosure vulnerability.

-- Corsaire Security Advisory --

Title: Verity Ultraseek path disclosure issue
Date: 04.01.13
Application: Verity Ultraseek 5.2.1 and prior
Environment: Solaris 7, Windows NT, Windows 2000, Redhat Linux
Author: Martin O'Neal []
Audience: General distribution
Reference: c040113-001

-- Scope --

The aim of this document is to clearly define a vulnerability in the
Verity Ultraseek search product, as supplied by Verity Inc. [1], that 
allows an attacker to disclose the actual path of the server side 
document root.

-- History --

Discovered: 13.01.04 
Vendor notified: 14.01.04
Scheduled release: 30.04.04
Verity requested delay due to bug in patch: 30.04.04
Document released: 05.05.04

-- Overview --

The Verity Ultraseek product provides a web-based search solution. In 
the event of an invalid value being entered, the actual path of the 
server side document root is disclosed in the error response.

-- Analysis --

The Ultraseek product provides its own web server interface, which 
parses URLs and returns search data based on the users selections. If a 
document path consisting of a standard device name (NUL, CON, AUX, COM1, 
COM2 etc) is entered, then the application responds with an error page 
that contains the actual path of the server side document root. 

This path can then be used in conjunction with other potential 
vulnerabilities to attack specific OS and application configuration 

-- Recommendations --

The vendor has released version 5.2.2 of the Ultraseek product, which is 
reported not to be susceptible to this issue (although this has not been 
independently verified by Corsaire). 

-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2004-0050 to this issue. This is a candidate for
inclusion in the CVE list (, which standardises
names for security problems.

-- References --


-- Revision --

a. Initial release.
b. Revised to include clearer device name definition.
c. Revised history section.
d. Released.

-- Distribution --

This security advisory may be freely distributed, provided that it 
remains unaltered and in its original form. 

-- Disclaimer --

The information contained within this advisory is supplied "as-is" with 
no warranties or guarantees of fitness of use or otherwise. Corsaire 
accepts no responsibility for any damage caused by the use or misuse of 
this information.

-- About Corsaire --

Corsaire are a leading information security consultancy, founded in 1997 
in Guildford, Surrey, UK. Corsaire bring innovation, integrity and 
analytical rigour to every job, which means fast and dramatic security 
performance improvements. Our services centre on the delivery of 
information security planning, assessment, implementation, management 
and vulnerability research. 

A free guide to selecting your security assessment supplier is available 

Copyright 2004 Corsaire Limited. All rights reserved. 


- 漏洞信息

Verity Ultraseek MS-DOS Device Name Request Path Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

Ultraseek contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an attacker requests documents with included device names (e.g., NUL, CON, AUX, COM1, COM2), which will disclose the physical path of the web server resulting in a loss of confidentiality.

- 时间线

2004-05-05 2004-01-13
Unknow Unknow

- 解决方案

Upgrade to version 5.2.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Verity Ultraseek Error Message Path Disclosure Vulnerability
Input Validation Error 10275
Yes No
2004-05-05 12:00:00 2009-07-12 04:07:00
Discovery is credited to Corsaire.

- 受影响的程序版本

Verity Inc. Ultraseek 5.2.1
Verity Inc. Ultraseek 5.2.2

- 不受影响的程序版本

Verity Inc. Ultraseek 5.2.2

- 漏洞讨论

It has been reported that Verity Ultraseek search application is prone to a remote path disclosure vulnerability that may allow an attacker to disclose the server document root.

Verity Ultraseek 5.2.1 and prior versions are reported to be vulnerable to this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 解决方案

Verity has released Ultraseek 5.2.2 to address this issue. Please contact the vendor to obtain a fixed version.

- 相关参考