CVE-1999-0045 : Detail

CVE-1999-0045

0.44%V3
Network
1999-09-29
02h00 +00:00
2024-08-01
16h27 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

List of arbitrary files on Web host via nph-test-cgi script.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 19536

Publication date : 1996-12-09 23h00 +00:00
Author : Josh Richards
EDB Verified : Yes

Apache <= 1.1,NCSA httpd <= 1.5.2,Netscape Commerce Server 1.12/Communications Server 1.1/Enterprise Server 2.0 a nph-test-cgi Vulnerability source: https://www.securityfocus.com/bid/686/info Description as given by Josh Richards: A security hole exists in the nph-test-cgi script included in most UNIX based World Wide Web daemon distributions. The nph-* scripts exist to allow 'non-parsed headers' to be sent via the HTTP protocol (this is not the cause of this security problem, though). The problem is that nph-test-cgi, which prints out information on the current web environment (just like 'test-cgi' does) does not enclose its arguments to the 'echo' command inside of quotes....shell escapes are not possible (or at least I have not found them to be--yet) but shell *expansion* is.... This means that _any_ remote user can easily browse your filesystem via the WWW. This is a bug with the nph-test-cgi script and _not_ the server itself. Enter the URL: <http://yourwebserver.com/cgi-bin/nph-test-cgi?*> Replace <yourwebserver.com> with the hostname of a server running a web daemon near you.

Products Mentioned

Configuraton 0

Apache>>Http_server >> Version 0.8.11

Apache>>Http_server >> Version 0.8.14

Apache>>Http_server >> Version 1.0

Apache>>Http_server >> Version 1.0.2

Apache>>Http_server >> Version 1.0.3

Apache>>Http_server >> Version 1.0.5

Apache>>Http_server >> Version 1.1

Netscape>>Commerce_server >> Version 1.12

Netscape>>Communications_server >> Version 1.1

Netscape>>Communications_server >> Version 1.12

Netscape>>Enterprise_server >> Version 2.0a

    References