exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

verity.txt

verity.txt
Posted May 7, 2004
Authored by Martin O'Neal

Verity Ultraseek versions 5.2.1 and below suffer from a path disclosure vulnerability.

tags | advisory
advisories | CVE-2004-0050
SHA-256 | 7d453bcafb1e5f1d30de0877909326e0a78a7f4796780b0c8aa184c41961b2cd

verity.txt

Change Mirror Download

-- Corsaire Security Advisory --

Title: Verity Ultraseek path disclosure issue
Date: 04.01.13
Application: Verity Ultraseek 5.2.1 and prior
Environment: Solaris 7, Windows NT, Windows 2000, Redhat Linux
Author: Martin O'Neal [martin.oneal@corsaire.com]
Audience: General distribution
Reference: c040113-001


-- Scope --

The aim of this document is to clearly define a vulnerability in the
Verity Ultraseek search product, as supplied by Verity Inc. [1], that
allows an attacker to disclose the actual path of the server side
document root.


-- History --

Discovered: 13.01.04
Vendor notified: 14.01.04
Scheduled release: 30.04.04
Verity requested delay due to bug in patch: 30.04.04
Document released: 05.05.04


-- Overview --

The Verity Ultraseek product provides a web-based search solution. In
the event of an invalid value being entered, the actual path of the
server side document root is disclosed in the error response.


-- Analysis --

The Ultraseek product provides its own web server interface, which
parses URLs and returns search data based on the users selections. If a
document path consisting of a standard device name (NUL, CON, AUX, COM1,
COM2 etc) is entered, then the application responds with an error page
that contains the actual path of the server side document root.

This path can then be used in conjunction with other potential
vulnerabilities to attack specific OS and application configuration
files.


-- Recommendations --

The vendor has released version 5.2.2 of the Ultraseek product, which is
reported not to be susceptible to this issue (although this has not been
independently verified by Corsaire).


-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2004-0050 to this issue. This is a candidate for
inclusion in the CVE list (http://cve.mitre.org), which standardises
names for security problems.


-- References --

[1] http://www.verity.com


-- Revision --

a. Initial release.
b. Revised to include clearer device name definition.
c. Revised history section.
d. Released.


-- Distribution --

This security advisory may be freely distributed, provided that it
remains unaltered and in its original form.


-- Disclaimer --

The information contained within this advisory is supplied "as-is" with
no warranties or guarantees of fitness of use or otherwise. Corsaire
accepts no responsibility for any damage caused by the use or misuse of
this information.


-- About Corsaire --

Corsaire are a leading information security consultancy, founded in 1997
in Guildford, Surrey, UK. Corsaire bring innovation, integrity and
analytical rigour to every job, which means fast and dramatic security
performance improvements. Our services centre on the delivery of
information security planning, assessment, implementation, management
and vulnerability research.

A free guide to selecting your security assessment supplier is available
at http://www.penetration-testing.com


Copyright 2004 Corsaire Limited. All rights reserved.



Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close