Vulnerabilities > CVE-1999-1178 - Unspecified vulnerability in Sambar Server 4.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
sambar
nessus

Summary

Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script.

Vulnerable Configurations

Part Description Count
Application
Sambar
1

Nessus

NASL familyCGI abuses
NASL idDUMPENV.NASL
descriptionCGI script
last seen2020-06-01
modified2020-06-02
plugin id10060
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10060
titleSambar Server dumpenv.pl Information Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10060);
 script_version("1.33");
 script_cvs_date("Date: 2018/06/13 18:56:26");
 script_cve_id("CVE-1999-1178");

 script_name(english:"Sambar Server dumpenv.pl Information Disclosure");
 script_summary(english:"Checks for the presence of /cgi-bin/dumpenv");

 script_set_attribute(attribute:"synopsis", value:
"The remote host has a CGI script that is affected by information
disclosure vulnerability.");
 script_set_attribute(attribute:"description", value:
"CGI script 'dumpenv.pl' is installed on the remote host. This CGI
gives away too much information about the web server configuration,
which will help an attacker.");
 script_set_attribute(attribute:"solution", value:"Remove it from /cgi-bin.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");

 script_set_attribute(attribute:"vuln_publication_date", value:"1998/06/10");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);

cgi = "dumpenv.pl";
res = is_cgi_installed3(item:cgi, port:port);
if( res )security_warning(port);