Vulnerabilities > CVE-2002-0266 - Unspecified vulnerability in Thunderstone Software Texis 3.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Thunderstone Texis CGI script allows remote attackers to obtain the full path of the web root via a request for a nonexistent file, which generates an error message that includes the full pathname.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Thunderstone TEXIS 3.0 Path Disclosure Vulnerability. CVE-2002-0266 . Remote exploits for multiple platform |
id | EDB-ID:21276 |
last seen | 2016-02-02 |
modified | 2002-02-06 |
published | 2002-02-06 |
reporter | phinegeek |
source | https://www.exploit-db.com/download/21276/ |
title | Thunderstone TEXIS 3.0 Path Disclosure Vulnerability |
Nessus
NASL family Web Servers NASL id 404_PATH_DISCLOSURE.NASL description The remote web server reveals the physical path of the webroot when a nonexistent page is requested. While printing errors to the output is useful for debugging applications, this feature should be disabled on production servers. last seen 2020-06-01 modified 2020-06-02 plugin id 11714 published 2003-06-11 reporter This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/11714 title Nonexistent Page (404) Physical Path Disclosure code # # (C) Tenable Network Security, Inc. # # Vulnerable servers: # Pi3Web/2.0.0 # # References # Date: 10 Mar 2002 04:23:45 -0000 # From: "Tekno pHReak" <[email protected]> # To: [email protected] # Subject: Pi3Web/2.0.0 File-Disclosure/Path Disclosure vuln # # Date: Wed, 14 Aug 2002 23:40:55 +0400 # From:"D4rkGr3y" <[email protected]> # To:[email protected], [email protected] # Subject: new bugs in MyWebServer # include("compat.inc"); if(description) { script_id(11714); script_version("1.24"); script_cvs_date("Date: 2018/06/27 18:42:26"); # Note: the way the test is made will lead to detecting some # path disclosure issues which might be checked by other plugins # (like #11226: Oracle9i jsp error). I have reviewed the reported # "path disclosure" errors from bugtraq and the following list # includes bugs which will be triggered by the NASL script. Some # other "path disclosure" bugs in webs ervers might not be triggered # since they might depend on some specific condition (execution # of a cgi, options..) # jfs - December 2003 script_cve_id("CVE-2001-1372", "CVE-2002-0266", "CVE-2002-2008", "CVE-2003-0456"); script_bugtraq_id(3341, 4035, 4261, 5054, 8075); script_xref(name:"CERT", value:"278971"); script_xref(name:"EDB-ID", value:"21276"); script_name(english:"Nonexistent Page (404) Physical Path Disclosure"); script_summary(english:"Tests for a generic path disclosure vulnerability."); script_set_attribute(attribute:"synopsis", value: "The remote web server is affected by an information disclosure vulnerability."); script_set_attribute(attribute:"description", value: "The remote web server reveals the physical path of the webroot when a nonexistent page is requested. While printing errors to the output is useful for debugging applications, this feature should be disabled on production servers."); # https://web.archive.org/web/20150509055227/http://archives.neohapsis.com/archives/bugtraq/2002-02/0003.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a3e58d0b"); # https://web.archive.org/web/20120713111456/http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0002.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9c4d1560"); # https://web.archive.org/web/20120714023155/http://archives.neohapsis.com/archives/bugtraq/2002-06/0225.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?67b9e782"); script_set_attribute(attribute:"solution", value: "Upgrade the web server to the latest version. Alternatively, reconfigure the web server to disable debug reporting."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(200); script_set_attribute(attribute:"vuln_publication_date", value:"2002/02/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2003/06/11"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc."); script_family(english: "Web Servers"); script_dependencie("iis_detailed_error.nasl"); script_require_ports("Services/www", 80); exit(0); } include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); ext_list = make_list( "", ".", ".asp", ".aspx", ".html", ".htm", ".shtm", ".shtml", ".jsp", ".jspx", ".php", ".php3", ".php4", ".php5", ".php6", ".cfm" ); port = get_http_port(default:80); if (get_kb_item("www/"+port+"/iis_detailed_errors")) exit(0, "The web server listening on port "+port+" appears to be an instance of IIS that returns detailed error messages."); foreach ext (ext_list) { filename = "niet" + rand() + ext; url = '/' + filename; res = test_generic_path_disclosure(item: url, method: "GET", port: port, filename: filename, fetch404: TRUE, exit_on_fail: TRUE); if(res) { set_kb_item(name:"www/"+port+"/generic_path_disclosure", value:TRUE); exit(0); } } exit(0, "The web server listening on port " + port + " is not affected.");
NASL family CGI abuses NASL id TEXIS_PATH_DISCLOSURE.NASL description The Thunderstone Software TEXIS application running on the remote host is affected by an information disclosure vulnerability that allows an unauthenticated, remote attacker to obtain the full path of the web root directory by making a specially crafted request for a nonexistent file. last seen 2020-06-01 modified 2020-06-02 plugin id 11401 published 2003-03-15 reporter This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/11401 title Thunderstone Software TEXIS Nonexistent File Request Path Disclosure code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if(description) { script_id(11401); script_version ("1.22"); script_cvs_date("Date: 2018/11/15 20:50:19"); script_cve_id("CVE-2002-0266"); script_bugtraq_id(4035); script_xref(name:"EDB-ID", value:"21276"); script_name(english:"Thunderstone Software TEXIS Nonexistent File Request Path Disclosure"); script_summary(english:"Checks for TEXIS path disclosure."); script_set_attribute(attribute:"synopsis", value: "A CGI application running on the remote host is affected by an information disclosure vulnerability."); script_set_attribute(attribute:"description", value: "The Thunderstone Software TEXIS application running on the remote host is affected by an information disclosure vulnerability that allows an unauthenticated, remote attacker to obtain the full path of the web root directory by making a specially crafted request for a nonexistent file."); script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Feb/66"); script_set_attribute(attribute:"solution", value: "Upgrade Thunderstone Software TEXIS to the latest version."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"); script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2002/02/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2003/03/15"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:thunderstone_software:texis"); script_end_attributes(); script_category(ACT_ATTACK); script_family(english:"CGI abuses"); script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc."); script_dependencie("http_version.nasl"); script_require_ports("Services/www", 80); script_exclude_keys("Settings/disable_cgi_scanning"); exit(0); } # # The script code starts here # include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); port = get_http_port(default:80); vuln = FALSE; files = make_list("texis.exe", "texis.cgi", "texis"); file404 = "/" + rand_str() + "-" + SCRIPT_NAME - ".nasl"; file_regex = "Can't open source file (.*): No such file"; foreach dir (cgi_dirs()) { foreach file (files) { url = "/" + file + file404; res = http_send_recv3( method : "GET", item : dir + url, port : port, exit_on_fail : TRUE ); if( ("Texis Web Script" >< res[2]) && egrep(pattern:file_regex, string:res[2], icase:TRUE) ) { vuln = TRUE; break; } } } if (vuln) { output = strstr(res[2], "Texis Web Script"); if (empty_or_null(output)) output = res[2]; security_report_v4( port : port, severity : SECURITY_WARNING, generic : TRUE, request : make_list(build_url(qs:dir + url, port:port)), output : chomp(output) ); exit(0); } else audit(AUDIT_WEB_SERVER_NOT_AFFECTED, port);
NASL family CGI abuses NASL id TEXIS_INFO_DISCLOSURE.NASL description The remote installation of Texis can be abused to disclose potentially sensitive information about the remote host, such as its internal IP address and the path to various components (eg, cmd.exe). last seen 2020-06-01 modified 2020-06-02 plugin id 11400 published 2003-03-15 reporter This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/11400 title Thunderstone Software Texis Crafted Request Information Disclosure code # # (C) Tenable Network Security, Inc. # include("compat.inc"); # Date: Fri, 14 Mar 2003 14:39:36 -0800 # To: [email protected] # Subject: @(#)Mordred Labs advisory - Texis sensitive information leak # From: [email protected] # # This is NOT CVE-2002-0266/BID4035 ! if(description) { script_id(11400); script_version ("1.22"); script_bugtraq_id(7105); script_name(english:"Thunderstone Software Texis Crafted Request Information Disclosure"); script_summary(english:"Checks for texis.exe"); script_set_attribute(attribute:"synopsis",value: "The remote web server contains a CGI script that is susceptible to an information disclosure attack." ); script_set_attribute(attribute:"description", value: "The remote installation of Texis can be abused to disclose potentially sensitive information about the remote host, such as its internal IP address and the path to various components (eg, cmd.exe)." ); script_set_attribute( attribute:"see_also", value:"https://seclists.org/bugtraq/2003/Mar/206" ); script_set_attribute( attribute:"see_also", value:"https://seclists.org/bugtraq/2003/Mar/247" ); script_set_attribute( attribute:"solution", value:"Contact Thunderstone tech support for a patch." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/03/14"); script_set_attribute(attribute:"patch_publication_date", value:"2003/03/18"); script_set_attribute(attribute:"plugin_publication_date", value:"2003/03/15"); script_cvs_date("Date: 2018/11/15 20:50:19"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"exploited_by_nessus", value:"true"); script_end_attributes(); script_category(ACT_ATTACK); script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc."); script_family(english:"CGI abuses"); script_dependencie("find_service1.nasl", "http_version.nasl"); script_require_ports("Services/www", 80); script_exclude_keys("Settings/disable_cgi_scanning"); exit(0); } # # The script code starts here # include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); port = get_http_port(default:80); foreach d ( cgi_dirs() ) { url = string(d, "/texis.exe/?-dump"); w = http_send_recv3(method:"GET", item:url, port:port); if (isnull(w)) exit (1, "The web server failed to respond."); res = strcat(w[0], w[1], '\r\n', w[2]); if("COMPUTERNAME" >< res ) { if (report_verbosity > 0) { report = string( "\n", "Nessus was able to exploit the issue using the following URL :\n", "\n", " ", build_url(port:port, qs:url), "\n" ); security_warning(port:port, extra:report); } else security_warning(port); exit(0); } }
References
- http://marc.info/?l=bugtraq&m=101301228031165&w=2
- http://marc.info/?l=bugtraq&m=101301228031165&w=2
- http://marc.info/?l=bugtraq&m=101346478229431&w=2
- http://marc.info/?l=bugtraq&m=101346478229431&w=2
- http://www.iss.net/security_center/static/8103.php
- http://www.iss.net/security_center/static/8103.php
- http://www.securityfocus.com/bid/4035
- http://www.securityfocus.com/bid/4035