what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

verity.txt

verity.txt
Posted May 7, 2004
Authored by Martin O'Neal

Verity Ultraseek versions 5.2.1 and below suffer from a path disclosure vulnerability.

tags | advisory
advisories | CVE-2004-0050
SHA-256 | 7d453bcafb1e5f1d30de0877909326e0a78a7f4796780b0c8aa184c41961b2cd

verity.txt

Change Mirror Download

-- Corsaire Security Advisory --

Title: Verity Ultraseek path disclosure issue
Date: 04.01.13
Application: Verity Ultraseek 5.2.1 and prior
Environment: Solaris 7, Windows NT, Windows 2000, Redhat Linux
Author: Martin O'Neal [martin.oneal@corsaire.com]
Audience: General distribution
Reference: c040113-001


-- Scope --

The aim of this document is to clearly define a vulnerability in the
Verity Ultraseek search product, as supplied by Verity Inc. [1], that
allows an attacker to disclose the actual path of the server side
document root.


-- History --

Discovered: 13.01.04
Vendor notified: 14.01.04
Scheduled release: 30.04.04
Verity requested delay due to bug in patch: 30.04.04
Document released: 05.05.04


-- Overview --

The Verity Ultraseek product provides a web-based search solution. In
the event of an invalid value being entered, the actual path of the
server side document root is disclosed in the error response.


-- Analysis --

The Ultraseek product provides its own web server interface, which
parses URLs and returns search data based on the users selections. If a
document path consisting of a standard device name (NUL, CON, AUX, COM1,
COM2 etc) is entered, then the application responds with an error page
that contains the actual path of the server side document root.

This path can then be used in conjunction with other potential
vulnerabilities to attack specific OS and application configuration
files.


-- Recommendations --

The vendor has released version 5.2.2 of the Ultraseek product, which is
reported not to be susceptible to this issue (although this has not been
independently verified by Corsaire).


-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2004-0050 to this issue. This is a candidate for
inclusion in the CVE list (http://cve.mitre.org), which standardises
names for security problems.


-- References --

[1] http://www.verity.com


-- Revision --

a. Initial release.
b. Revised to include clearer device name definition.
c. Revised history section.
d. Released.


-- Distribution --

This security advisory may be freely distributed, provided that it
remains unaltered and in its original form.


-- Disclaimer --

The information contained within this advisory is supplied "as-is" with
no warranties or guarantees of fitness of use or otherwise. Corsaire
accepts no responsibility for any damage caused by the use or misuse of
this information.


-- About Corsaire --

Corsaire are a leading information security consultancy, founded in 1997
in Guildford, Surrey, UK. Corsaire bring innovation, integrity and
analytical rigour to every job, which means fast and dramatic security
performance improvements. Our services centre on the delivery of
information security planning, assessment, implementation, management
and vulnerability research.

A free guide to selecting your security assessment supplier is available
at http://www.penetration-testing.com


Copyright 2004 Corsaire Limited. All rights reserved.



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close