Netscape Enterpise Server JHTML View Source 漏洞

漏洞信息详情

Netscape Enterpise Server JHTML View Source 漏洞

漏洞简介

Netscape Enterprise Server 3.5.1以及可能其他版本搜索引擎的默认配置存在漏洞。远程攻击者通过指定使用HTML-tocrec-demo1.pat模式文件的搜索命令读取JHTML的源文件。

漏洞公告

A work-around is to keep all active content in an unindexed directory, and if you do not explicitly require the search engine functionality it should be disabled.
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

参考网址

来源: BUGTRAQ
名称: 19990730 Netscape Enterprise Server yeilds source of JHTML
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=93346448121208&w=2

来源: BID
名称: 559
链接:http://www.securityfocus.com/bid/559

来源: NTBUGTRAQ
名称: 19990730 Netscape Enterprise Server yeilds source of JHTML
链接:http://marc.theaimsgroup.com/?l=ntbugtraq&m=93337389603117&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享