Korean
<< Back
VID 29004
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Alchemy Eye tool has an HTTP remote command execution vulnerability.
Alchemy Eye and Alchemy Network Monitor are network management tools for Microsoft Windows. The products contain a built-in HTTP server for remote monitoring and control. This HTTP server allows arbitrary commands to be run on the server by a remote attacker.
Attackers can traverse out of the root directory by placing MS-DOS device names before the first "../" like:
http://target/cgi-bin/NUL/../../../../WINNT/system32/ipconfig.exe
http://target/cgi-bin/PRN/../../../../WINNT/system32/ipconfig.exe

* References:
http://www.securityfocus.com/bid/3599
http://www.securityfocus.com/archive/1/243404
Recommendation Either disable HTTP access in Alchemy Eye, or require authentication for Alchemy Eye. Both of these can be set in the Alchemy Eye preferences.
Related URL CVE-2001-0871 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)