Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:RH-ICOMMERCE-ANYFILE

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

RedHat Interchange Commerce Arbitrary File Read

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: RedHat Interchange Commerce Arbitrary File Read


This signature detects attempts to exploit a directory traversal vulnerability in Red Hat Interchange Commerce Servers. A successful directory traversal attack, can allow attackers to read any file on the system.

Extended Description

A vulnerability has been reported for Interchange 4.8.5 and earlier. Reportedly, Interchange may disclose contents of files to attackers. The vulnerability occurs due to the placement of the 'doc' folder. Reportedly, the folder will be installed as follows: <INTERCHANGE_ROOT>/doc. This folder, by default, contains Interchange man pages. This vulnerability is only exploitable when the Interchange service runs in INET (Internet service) mode. An attacker may exploit this vulnerability to the contents of restricted files accessible to the Interchange process. It has been reported that this issue may be exploited through a '../' directory traversal sequence in a HTTP request to the vulnerable server.

Affected Products

  • Red Hat Interchange 4.8.1
  • Red Hat Interchange 4.8.2
  • Red Hat Interchange 4.8.3
  • Red Hat Interchange 4.8.4
  • Red Hat Interchange 4.8.5

References

  • BugTraq: 5453
  • CVE: CVE-2002-0874
  • URL: http://www.icdevgroup.org/
  • URL: http://www.debian.org/security/2002/dsa-150
  • URL: http://www.securitytracker.com/alerts/2002/Aug/1005032.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out