[原文]Verity Ultraseek before 5.2.2 allows remote attackers to obtain the full pathname of the document root via an MS-DOS device name in the web search option, such as (1) NUL, (2) CON, (3) AUX, (4) COM1, (5) COM2, and others.
Verity Ultraseek versions 5.2.1 and below suffer from a path disclosure vulnerability.
-- Corsaire Security Advisory --
Title: Verity Ultraseek path disclosure issue
Application: Verity Ultraseek 5.2.1 and prior
Environment: Solaris 7, Windows NT, Windows 2000, Redhat Linux
Author: Martin O'Neal [firstname.lastname@example.org]
Audience: General distribution
-- Scope --
The aim of this document is to clearly define a vulnerability in the
Verity Ultraseek search product, as supplied by Verity Inc. , that
allows an attacker to disclose the actual path of the server side
-- History --
Vendor notified: 14.01.04
Scheduled release: 30.04.04
Verity requested delay due to bug in patch: 30.04.04
Document released: 05.05.04
-- Overview --
The Verity Ultraseek product provides a web-based search solution. In
the event of an invalid value being entered, the actual path of the
server side document root is disclosed in the error response.
-- Analysis --
The Ultraseek product provides its own web server interface, which
parses URLs and returns search data based on the users selections. If a
document path consisting of a standard device name (NUL, CON, AUX, COM1,
COM2 etc) is entered, then the application responds with an error page
that contains the actual path of the server side document root.
This path can then be used in conjunction with other potential
vulnerabilities to attack specific OS and application configuration
-- Recommendations --
The vendor has released version 5.2.2 of the Ultraseek product, which is
reported not to be susceptible to this issue (although this has not been
independently verified by Corsaire).
-- CVE --
The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2004-0050 to this issue. This is a candidate for
inclusion in the CVE list (http://cve.mitre.org), which standardises
names for security problems.
-- References --
-- Revision --
a. Initial release.
b. Revised to include clearer device name definition.
c. Revised history section.
-- Distribution --
This security advisory may be freely distributed, provided that it
remains unaltered and in its original form.
-- Disclaimer --
The information contained within this advisory is supplied "as-is" with
no warranties or guarantees of fitness of use or otherwise. Corsaire
accepts no responsibility for any damage caused by the use or misuse of
-- About Corsaire --
Corsaire are a leading information security consultancy, founded in 1997
in Guildford, Surrey, UK. Corsaire bring innovation, integrity and
analytical rigour to every job, which means fast and dramatic security
performance improvements. Our services centre on the delivery of
information security planning, assessment, implementation, management
and vulnerability research.
A free guide to selecting your security assessment supplier is available
Copyright 2004 Corsaire Limited. All rights reserved.
Verity Ultraseek MS-DOS Device Name Request Path Disclosure
Remote / Network Access
Loss of Confidentiality
Ultraseek contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an attacker requests documents with included device names (e.g., NUL, CON, AUX, COM1, COM2), which will disclose the physical path of the web server resulting in a loss of confidentiality.
Upgrade to version 5.2.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Verity Inc. Ultraseek 5.2.1
Verity Inc. Ultraseek 5.2.2
Verity Inc. Ultraseek 5.2.2
It has been reported that Verity Ultraseek search application is prone to a remote path disclosure vulnerability that may allow an attacker to disclose the server document root.
Verity Ultraseek 5.2.1 and prior versions are reported to be vulnerable to this issue.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: email@example.com <mailto:firstname.lastname@example.org>.
Verity has released Ultraseek 5.2.2 to address this issue. Please contact the vendor to obtain a fixed version.