Vulnerabilities > CVE-2001-0302 - Buffer Overflow vulnerability in PI3 Pi3Web 1.0.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
pi3
nessus
exploit available

Summary

Buffer overflow in tstisapi.dll in Pi3Web 1.0.1 web server allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long URL.

Vulnerable Configurations

Part Description Count
Application
Pi3
1

Exploit-Db

descriptionJohn Roy Pi3Web 1.0.1 Buffer Overflow Vulnerability. CVE-2001-0302. Dos exploit for windows platform
idEDB-ID:20634
last seen2016-02-02
modified2001-02-15
published2001-02-15
reporterjoetesta
sourcehttps://www.exploit-db.com/download/20634/
titleJohn Roy Pi3Web 1.0.1 - Buffer Overflow Vulnerability

Nessus

NASL familyWeb Servers
NASL idPI3WEB_ISAPI.NASL
descriptionThe
last seen2020-06-01
modified2020-06-02
plugin id10618
published2001-02-20
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10618
titlePi3Web tstisap.dll Long URL Overflow
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10618);
 script_version ("1.23");
 script_cve_id("CVE-2001-0302", "CVE-2001-0303");
 script_bugtraq_id(2381);

 script_name(english:"Pi3Web tstisap.dll Long URL Overflow");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a script that is affected by several
issues." );
 script_set_attribute(attribute:"description", value:
"The '/isapi/tstisapi.dll' cgi is installed.  This CGI has a well-known
security flaw that lets anyone execute arbitrary commands with the
privileges of the http service. 

In addition, it discloses the physical path to the web root if an
invalid URL is requested." );
 script_set_attribute(attribute:"solution", value:
"Remove the script from /isapi." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2001/02/20");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/02/15");
 script_cvs_date("Date: 2018/07/24 18:56:13");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:pi3:pi3web");
 script_end_attributes();

 
 summary["english"] = "Checks for the presence of /isapi/tstisapi.dll";
 script_summary(english:summary["english"]);
 
 script_category(ACT_ATTACK);
 
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"Web Servers");
 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if ( "Pi3Web/" >!< banner ) exit(0);

w = http_send_recv3(method:"GET", item:"/isapi/tstisapi.dll", port:port);
r = strcat(r[0], r[1], '\r\n', r[2]);
if ("SERVER_SOFTWARE=Pi3Web/1.0.1" >< r)security_hole(port);