Vulnerability Name: | CVE-2000-1191 (CCN-7367) | ||||||||||||
Assigned: | 2000-04-18 | ||||||||||||
Published: | 2000-04-18 | ||||||||||||
Updated: | 2020-12-09 | ||||||||||||
Summary: | htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path. | ||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-209 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2000-1191 Source: CCN Type: SourceForge.net WWW Search Engine Software Source: CCN Type: OSVDB ID: 292 ht://Dig (htdig) htsearch Arbitrary Configuration Path Disclosure Source: CCN Type: SecuriTeam Mailing List, Security Holes & Exploits 18 April 2000 htDig reveals web server configuration paths Source: MISC Type: Broken Link http://www.securiteam.com/exploits/htDig_reveals_web_server_configuration_paths.html Source: BID Type: Third Party Advisory, VDB Entry 4366 Source: CCN Type: BID-4366 ht://Dig Configuration File Path Disclosure Vulnerability Source: XF Type: Third Party Advisory, VDB Entry htdig-htsearch-path-disclosure(7367) Source: XF Type: UNKNOWN htdig-htsearch-path-disclosure(7367) Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:10526 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |