Summary
Redhat Stronghold Secure Server File System Disclosure Vulnerability
The problem:
In Redhat Stronghold from versions 2.3 up to 3.0 a flaw exists that allows a remote attacker to disclose sensitive system files including the httpd.conf file, if a restricted access to the server status report is not enabled when using those features.
This may assist an attacker in performing further attacks.
By trying the following urls, an attacker can gather sensitive information:
http://target/stronghold-info will give information on configuration http://target/stronghold-status will return among other information the list of request made
Please note that this attack can be performed after a default installation. The vulnerability seems to affect all previous version of Stronghold.
Vendor status:
Patch was released (November 19, 2001)
Severity
Classification
-
CVE CVE-2001-0868 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- appRain CMF 'uploadify.php' Remote Arbitrary File Upload Vulnerability
- Adobe BlazeDS XML and XML External Entity Injection Vulnerabilities
- Apache CouchDB Cross Site Request Forgery Vulnerability
- Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
- Apache ActiveMQ Persistent Cross-Site Scripting Vulnerability