Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Published: 1998-06-10
Updated: 2024-11-20
Summary
Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script.
Vulnerable Configurations
Part | Description | Count |
Application | Sambar | 1 |
Nessus
NASL family | CGI abuses |
NASL id | DUMPENV.NASL |
description | CGI script |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10060 |
published | 1999-06-22 |
reporter | This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10060 |
title | Sambar Server dumpenv.pl Information Disclosure |
code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(10060);
script_version("1.33");
script_cvs_date("Date: 2018/06/13 18:56:26");
script_cve_id("CVE-1999-1178");
script_name(english:"Sambar Server dumpenv.pl Information Disclosure");
script_summary(english:"Checks for the presence of /cgi-bin/dumpenv");
script_set_attribute(attribute:"synopsis", value:
"The remote host has a CGI script that is affected by information
disclosure vulnerability.");
script_set_attribute(attribute:"description", value:
"CGI script 'dumpenv.pl' is installed on the remote host. This CGI
gives away too much information about the web server configuration,
which will help an attacker.");
script_set_attribute(attribute:"solution", value:"Remove it from /cgi-bin.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_attribute(attribute:"vuln_publication_date", value:"1998/06/10");
script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
script_family(english:"CGI abuses");
script_dependencie("http_version.nasl");
script_require_keys("Settings/ParanoidReport");
script_require_ports("Services/www", 80);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
if (report_paranoia < 2) audit(AUDIT_PARANOID);
port = get_http_port(default:80);
cgi = "dumpenv.pl";
res = is_cgi_installed3(item:cgi, port:port);
if( res )security_warning(port);
|