Overview
Oracle 9i Application Server (9iAS) allows remote anonymous users to view source code in CGI scripts stored in the Apache cgi-bin. Attackers may analyze these scripts to discover usernames, passwords, or other proprietary data or methods.
Description
The default Apache configuration file in Oracle 9iAS provides a Location alias from "/perl" to "/cgi-bin". Because this alias is not defined as a ScriptAlias, documents accessed through the "/perl" alias are not interpreted as scripts should be. Instead, the server simply outputs the contents of the document. |
Impact
Attackers may read the source code of CGI scripts by requesting them through the "/perl" alias. Attackers may analyze source code to discover usernames, passwords, or other proprietary data or methods. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Edit the "httpd.conf" file to change the "/perl" alias into a ScriptAlias. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to David Litchfield for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
Other Information
CVE IDs: | None |
Severity Metric: | 11.25 |
Date Public: | 2002-01-10 |
Date First Published: | 2002-02-27 |
Date Last Updated: | 2002-03-05 22:28 UTC |
Document Revision: | 8 |