Overview
A vulnerability exists in the Ultraseek /highlight/index.html script. Successful exploitation of this vulnerability may allow an attacker to enumerate and access content from non-public servers or execute cross-site scripting attacks.
Description
Ultraseek is a search engine used on private and public websites. Ultraseek includes the /highlight/index.html script which highlights strings in search results. An attacker may be able to exploit this vulnerability by sending specially-crafted URLs to the vulnerable script. Note that Ultraseek was previously produced by Verity, which is now owned by Autonomy. |
Impact
A remote, unauthenticated attacker could provide arbitrary content to a web site, effectively performing cross-site scripting attacks. An attacker could also access content from or enumerate non-public hosts and services. |
Solution
Configure in-document highlighting filter
Note that the default setting for new installations of Ultraseek 5.7 will set the in-document filter to only allow the highlighting features for the server's domain name. This change is documented as bugfix 1443 in the Ultraseek 5.7 release notes: [1443] The default filters for document highlighting are now more restrictive, automatically limited to either the current domain, or the collection URL filters. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A |
References
Acknowledgements
This vulnerability was disclosed by TippingPoint.
This document was written by Jason McCormick and Ryan Giobbi.
Other Information
CVE IDs: | CVE-2006-5819 |
Severity Metric: | 6.06 |
Date Public: | 2006-11-15 |
Date First Published: | 2006-12-01 |
Date Last Updated: | 2006-12-06 19:47 UTC |
Document Revision: | 58 |