GEN:SID | 1:1652 |
Message | WEB-CGI campus attempt |
Summary | This event is generated when an attempt is made to exploit a known vulnerability in version 1.2 of NCSA web server.
|
Impact | File retrieval leading to compromise of confidential information, potential root exploit.
|
Detailed Information | This event is generated when an attempt is made to manipulate a cgi script to retrieve files outside the web root of version 1.2 of the NCSA web server.
The vulnerability exists in the cgi script "campas"
|
Affected Systems | web servers running a very old (1995) version of NCSA web server may have this cgi script installed.
|
Attack Scenarios | The attacker can make an HTTP GET request to the script and include variables to retrieve a sensitive system file in the following manner:
GET /cgi-bin/campas?%0acat%0a/etc/passwd%0a
|
Ease of Attack | Simple. No exploit software required
|
Corrective Action | Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied.
|
Additional References | |
Rule References | bugtraq: 1975
cve: 1999-0146
nessus: 10035
|