Vulnerabilities > CVE-2000-0192 - Unspecified vulnerability in Caldera Openlinux 2.3

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
caldera
nessus
exploit available

Summary

The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows remote attackers to determine what packages are installed on the system.

Vulnerable Configurations

Part Description Count
OS
Caldera
1

Exploit-Db

descriptionCaldera OpenLinux 2.3 rpm_query CGI Vulnerability. CVE-2000-0192. Remote exploit for cgi platform
idEDB-ID:19795
last seen2016-02-02
modified2000-03-05
published2000-03-05
reporterharikiri
sourcehttps://www.exploit-db.com/download/19795/
titleCaldera OpenLinux 2.3 - rpm_query CGI Vulnerability

Nessus

NASL familyCGI abuses
NASL idRPM_QUERY.NASL
descriptionThe rpm_query CGI is installed. This CGI allows anyone who can connect to this web server to obtain the list of the installed RPMs. This allows an attacker to determine the version number of your installed services, hence making their attacks more accurate.
last seen2020-06-01
modified2020-06-02
plugin id10340
published2000-03-07
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10340
titlerpm_query CGI System Information Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10340);
 script_version("1.25");
 script_cvs_date("Date: 2018/07/30 11:55:11");

 script_cve_id("CVE-2000-0192");
 script_bugtraq_id(1036);

 script_name(english:"rpm_query CGI System Information Disclosure");
 script_summary(english:"checks for rpm_query");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure
vulnerability.");
 script_set_attribute(attribute:"description", value:
"The rpm_query CGI is installed.

This CGI allows anyone who can connect to this web server to obtain
the list of the installed RPMs.

This allows an attacker to determine the version number of your
installed services, hence making their attacks more accurate.");
 script_set_attribute(attribute:"solution", value:"Remove this CGI from cgi-bin/");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2000/03/05");
 script_set_attribute(attribute:"plugin_publication_date", value:"2000/03/07");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "webmirror.nasl", "no404.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);
res = is_cgi_installed3(item:"rpm_query", port:port);
if(res) security_warning(port);