Short Name |
HTTP:COBALT:CONF-DIR-TRAV |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Cobalt RAQ 4 Configuration Directory Traversal |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects directory traversal attempts against Cobalt RAQ 4 Server Management running on Solaris or Linux. Attackers can gain access to sensitive information from configuration files located in the restricted /admin directory.
RaQ is a server appliance originally developed by Cobalt. It is now distributed and maintained by Sun Microsystems. It has been reported that Cobalt RaQ appliances are vulnerable to a directory traversal attack. Using this attack, it is possible for a remote user to read sensitive configuration files, such as .htaccess files, and could potentially result in unauthorized access to restricted information. It is unknown whether this attack will permit escape of the HTTP root directory.