| VID |
29004 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Alchemy Eye tool has an HTTP remote command execution vulnerability. Alchemy Eye and Alchemy Network Monitor are network management tools for Microsoft Windows. The products contain a built-in HTTP server for remote monitoring and control. This HTTP server allows arbitrary commands to be run on the server by a remote attacker. Attackers can traverse out of the root directory by placing MS-DOS device names before the first "../" like: http://target/cgi-bin/NUL/../../../../WINNT/system32/ipconfig.exe http://target/cgi-bin/PRN/../../../../WINNT/system32/ipconfig.exe
* References: http://www.securityfocus.com/bid/3599 http://www.securityfocus.com/archive/1/243404 |
| Recommendation |
Either disable HTTP access in Alchemy Eye, or require authentication for Alchemy Eye. Both of these can be set in the Alchemy Eye preferences. |
| Related URL |
CVE-2001-0871 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|