Mandrake Linux Apache mod_perl列出目录内容漏洞

Mandrake Linux Apache mod_perl列出目录内容漏洞

漏洞ID 1105998 漏洞类型 未知
发布时间 2000-09-11 更新时间 2005-05-02
图片[1]-Mandrake Linux Apache mod_perl列出目录内容漏洞-安全小百科CVE编号 CVE-2000-0883
图片[2]-Mandrake Linux Apache mod_perl列出目录内容漏洞-安全小百科CNNVD-ID CNNVD-200011-018
漏洞平台 Linux CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20220
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200011-018
|漏洞详情
安装在MandrakeLinux6.1至7.1版本的Apache中mod_perl的默认配置设置/perl/目录为可浏览,远程攻击者利用该漏洞列出该目录的内容。
|漏洞EXP
source: http://www.securityfocus.com/bid/1678/info

The default configuration files for versions of mod_perl shipped with Mandrake Linux 6.1 through 7.1 contain a misconfiguration that can be a security concern in some situations. The /perl directory is part of the webserver's root tree (the subdirectory tree from which files are accessable on the webserver..) that is used to store perl scripts. In the configuration file for mod_perl, the apache perl interpreter module, the directory is permitted to be "indexed".. meaning that the webserver will display the contents of the directory if it is requested by itself. The result is that an attacker can see what files are in /perl. While this bug does not affect how the webserver interprets the files in that directory (eg., it will still execute them), knowing what is there to be executed can allow for more targeted and intelligent attacks against scripts known to be vulnerable listed there.

Point your web browser to http://target/perl.
|参考资料

来源:XF
名称:linux-mod-perl
链接:http://xforce.iss.net/static/5257.php
来源:BID
名称:1678
链接:http://www.securityfocus.com/bid/1678
来源:MANDRAKE
名称:MDKSA-2000:046
链接:http://archives.neohapsis.com/archives/bugtraq/2000-09/0111.html

相关推荐: MySQL Control Center Insecure Default File Permission Vulnerability

MySQL Control Center Insecure Default File Permission Vulnerability 漏洞ID 1100793 漏洞类型 Design Error 发布时间 2003-03-07 更新时间 2003-03-07…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享