Vulnerabilities > CVE-1999-1178 - Unspecified vulnerability in Sambar Server 4.1

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
sambar
nessus

Summary

Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script.

Vulnerable Configurations

Part Description Count
Application
Sambar
1

Nessus

NASL familyCGI abuses
NASL idDUMPENV.NASL
descriptionCGI script
last seen2020-06-01
modified2020-06-02
plugin id10060
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10060
titleSambar Server dumpenv.pl Information Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10060);
 script_version("1.33");
 script_cvs_date("Date: 2018/06/13 18:56:26");
 script_cve_id("CVE-1999-1178");

 script_name(english:"Sambar Server dumpenv.pl Information Disclosure");
 script_summary(english:"Checks for the presence of /cgi-bin/dumpenv");

 script_set_attribute(attribute:"synopsis", value:
"The remote host has a CGI script that is affected by information
disclosure vulnerability.");
 script_set_attribute(attribute:"description", value:
"CGI script 'dumpenv.pl' is installed on the remote host. This CGI
gives away too much information about the web server configuration,
which will help an attacker.");
 script_set_attribute(attribute:"solution", value:"Remove it from /cgi-bin.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");

 script_set_attribute(attribute:"vuln_publication_date", value:"1998/06/10");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);

cgi = "dumpenv.pl";
res = is_cgi_installed3(item:cgi, port:port);
if( res )security_warning(port);