Korean
<< Back
VID 22084
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description In Redhat Stronghold from versions 2.3 up to 3.0 a flaw exists that allows a remote attacker to disclose sensitive system files including the httpd.conf file, if a restricted access to the server status report is not enabled when using those features. A malicious user viewing this information may be able to use it to stage further attacks on the server.
Redhat Stronghold Secure Web Server is a web server based on the Apache source and designed to be robust and secure.

By trying the following URLs, an attacker can gather sensitive information:
http://target/stronghold-info
http://target/stronghold-status

These URLs are not enabled in the default installation. But please test that this attack can be performed after a default installation.
Recommendation This problem has been patched in build 3015 of Stronghold.

The Stronghold Administration guide suggests making the following changes to httpd.conf to deny access to outside parties:

1) Locate the following container in httpd.conf:
<Location /stronghold-status>
SetHandler server-status
</Location>

2) Add the following inside the container:
order deny,allow
deny from all
allow from .your.domain
Related URL CVE-2001-0868 (CVE)
Related URL 3577 (SecurityFocus)
Related URL 7582 (ISS)