| VID |
22040 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Sun's iPlanet Web Server has a flaw in its search function that allows remote viewing of any files on the server. The search engine that is included with iPlanet and previous versions uses HTML pattern files to get and format search parameters from users. By using the NS-query-pat command, a user can specify their own query pattern file rather than using the default one provided by the web site. Unfortunately, the search engine does no validity checking on the query pattern file thus requested. If, for instance, you telnet to port 80 on an iWS web server and issue the command:
GET /search?NS-query-pat=..\..\..\..\..\boot.ini
iPlanet will happily provide you with the contents of the boot.ini file. This overrides all access control lists.
* References: http://www.iss.net/security_center/static/9517.php
Platforms Affected: * iPlanet Web Server 6.0 SP2 * iPlanet Web Server 4.1 SP9 * Microsoft Windows Any version |
| Recommendation |
As a workaround, turn off the search engine (it is off by default on 6.0) until a fix is provided.
Apply the appropriate patch (6.0 SP3/4.1 SP10) for the vulnerable system, available from: http://www.oracle.com/technetwork/java/webtier/downloads/iplanet-webserver-525365.html |
| Related URL |
CVE-2002-1042 (CVE) |
| Related URL |
5191 (SecurityFocus) |
| Related URL |
(ISS) |
|