Korean
<< Back
VID 21017
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The 'aglimpse' CGI is installed.
The aglimpse CGI script shipped with Glimpse HTTP 2.0 and WebGlimpse versions prior to 1.5 contains a vulnerability that would allow an attacker to remotely execute commands on a web server with the UID of the user running the httpd process.
Recommendation 1. If it's not needed, remove the file from /cgi-bin directory

2. Upgrade to WebGlimpse at http://donkey.cs.arizona.edu/security.html.

3. As a temporary fix, log on as root on the vulnerable machine and type:

# /bin/chmod 400 /usr/local/etc/httpd/cgi-bin/aglimpse

Replace the path name with your cgi-bin directory.

4. Patches: Insert a / character at the start of the open command in the aglimpse program (around line 72).

The vulnerable line is:
open(CONF,'$indexdir/archive.cfg') || &err_conf;

The patched line is:
open(CONF,'/$indexdir/archive.cfg') || &err_conf;
Related URL CVE-1999-0147 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)