Vulnerabilities > CVE-2001-0868 - Information Disclosure vulnerability in Redhat Stronghold 2.3/3.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Red Hat Stronghold 2.3 to 3.0 allows remote attackers to retrieve system information via an HTTP GET request to (1) stronghold-info or (2) stronghold-status.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Nessus
NASL family | CGI abuses |
NASL id | STRONGHOLD.NASL |
description | Redhat Stronghold Secure Server File System Disclosure Vulnerability The problem: In Redhat Stronghold from versions 2.3 up to 3.0 a flaw exists that allows a remote attacker to disclose sensitive system files including the httpd.conf file, if a restricted access to the server status report is not enabled when using those features. This may assist an attacker in performing further attacks. By trying the following urls, an attacker can gather sensitive information: http://target/stronghold-info will give information on configuration http://target/stronghold-status will return among other information the list of request made Please note that this attack can be performed after a default installation. The vulnerability seems to affect all previous version of Stronghold. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10803 |
published | 2001-11-25 |
reporter | This script is Copyright (C) 2001-2018 Felix Huber |
source | https://www.tenable.com/plugins/nessus/10803 |
title | Redhat Stronghold status / info Request Information Disclosure |
code |
|