Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:COBALT:CONF-DIR-TRAV

Severity

Medium

Recommended

No

Category

HTTP

Keywords

Cobalt RAQ 4 Configuration Directory Traversal

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Cobalt RAQ 4 Configuration Directory Traversal


This signature detects directory traversal attempts against Cobalt RAQ 4 Server Management running on Solaris or Linux. Attackers can gain access to sensitive information from configuration files located in the restricted /admin directory.

Extended Description

RaQ is a server appliance originally developed by Cobalt. It is now distributed and maintained by Sun Microsystems. It has been reported that Cobalt RaQ appliances are vulnerable to a directory traversal attack. Using this attack, it is possible for a remote user to read sensitive configuration files, such as .htaccess files, and could potentially result in unauthorized access to restricted information. It is unknown whether this attack will permit escape of the HTTP root directory.

Affected Products

  • Cobalt RaQ 2.0.0
  • Cobalt RaQ 3.0.0
  • Cobalt RaQ 4.0.0
  • Sun Cobalt RaQ 2
  • Sun Cobalt RaQ 4

References

  • BugTraq: 4208
  • CVE: CVE-2002-0347

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out