HTTP CGI Gives Information
Updated 6/4/02
Impact
If a malicious user is able to exploit this vulnerability, he or she may be able acquire
information about the web server and system settings of the exploited system. In certain
circumstances, an attacker may even be able to gather information about user accounts on the
affected system. A malicious user may then be able to gain unauthorized access to the system
using this information. (Remember, an attacker's best weapon is knowledge!) For example, if an
attacker is able to learn information about the operating system of the target, he or she will
then be able to gear certain attacks (such as buffer overflows) towards that specific operating
system.
Background
This section is only available with the purchase of
SAINTwriter,
SAINTexpressSM, or
WebSAINTSM.
The Problems
This section is only available with the purchase of
SAINTwriter,
SAINTexpressSM, or
WebSAINTSM.
Resolutions
This section is only available with the purchase of
SAINTwriter,
SAINTexpressSM, or
WebSAINTSM.
Where can I read more about this?
This section is only available with the purchase of
SAINTwriter,
SAINTexpressSM, or
WebSAINTSM.