Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Redhat Stronghold File System Disclosure

Vulnerability Assessment Details

Redhat Stronghold File System Disclosure

Vulnerability Assessment Summary
Redhat Stronghold File System Disclosure

Detailed Explanation for this Vulnerability Assessment

Redhat Stronghold Secure Server File System Disclosure Vulnerability

The problem:
In Redhat Stronghold from versions 2.3 up to 3.0 a flaw exists that
permits a remote attacker to disclose sensitive system files including
the httpd.conf file, if a restricted access to the server status
report is not enabled when using those features.
This may assist a possible hacker in performing further attacks.

By trying the following urls, a possible hacker can gather sensitive
http://target/stronghold-info will give information on configuration
http://target/stronghold-status will return among other information
the list of request made

Please note that this attack can be performed after a default
installation. The vulnerability seems to affect all previous version
of Stronghold.

Vendor status:
Patch was released (November 19, 2001)

Network Security Threat Level: Medium

Networks Security ID: 3577

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Felix Huber

Cables, Connectors


No Discussions have been posted on this vulnerability.