HTTP: Technote print.cgi "board" Function File Disclosure

This signature detects directory traversal attempts that exploit the print.cgi script in TECH-NOTE 2000. Because the script validates input incorrectly, attackers can remotely access arbitrary files from the server.

Extended Description

Technote Inc. offers a Multicommunication Package which includes a web board type of service. A script that ships with Technote, print.cgi, accepts a parameter called "board". This remotely-supplied variable is used as a filename when the open() function is called. In addition to allowing the attacker to specify a file to be opened remotely, the variable is not checked for "../" character sequences. As a result, a malicious remote user can specify an arbitrary file on the file system as this variable (by using ../ sequences followed by its real path), which will be opened by the script. Its contents will then be disclosed to the attacker. Successful exploitation of this vulnerability could lead to the disclosure of sensitive information and possibly assist in further attacks against the victim It should be noted that the attacker may only read files which are accessible to the web-server process.

Affected Products

Technote technote

References

BugTraq: 2155

CVE: CVE-2001-0074

Short Name
HTTP:CGI:TECHNOTE-PRINT-DSCLSR
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
"board" CVE-2001-0074 Disclosure File Function Technote bid:2155 print.cgi
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Technote

CVSS Score

5.0

Found a potential security threat?