CVE-1999-0045

HIGH7.5/ 10.0
Share:
Published: December 10, 1996 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

List of arbitrary files on Web host via nph-test-cgi script.

CVSS Metrics

Base Score
7.5
Severity
HIGH
Vector String
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Critical vulnerability allows attackers to read arbitrary files on a web server by exploiting the nph-test-cgi script. This can lead to sensitive data disclosure, including configuration files, passwords, and potentially the ability to compromise the entire server. This is a high-severity vulnerability due to its ease of exploitation and potential impact.

02 // Vulnerability Mechanism

Step 1: Identify the Vulnerable Script: The attacker identifies the presence of the nph-test-cgi script on the target web server, typically by scanning for common file locations or through directory listing vulnerabilities.

Step 2: Craft the Payload: The attacker constructs a URL that includes the path to the nph-test-cgi script and a crafted parameter specifying the file to be read. This parameter utilizes path traversal techniques (e.g., ../) to navigate outside the intended directory.

Step 3: Submit the Request: The attacker sends the crafted URL to the web server.

Step 4: Script Execution: The web server executes the nph-test-cgi script, passing the attacker-supplied file path as an argument.

Step 5: File Read and Disclosure: The nph-test-cgi script, lacking proper input validation, reads the contents of the specified file and returns it in the HTTP response, allowing the attacker to view the file's contents.

03 // Deep Technical Analysis

The vulnerability stems from a lack of input validation within the nph-test-cgi script. This script, often included with older web server installations, is designed for testing CGI functionality. It fails to properly sanitize user-supplied input, allowing an attacker to specify arbitrary file paths. The script then attempts to read and display the contents of these files, effectively bypassing security restrictions and enabling unauthorized access to sensitive information. The root cause is a simple path traversal vulnerability, where the script does not check or restrict the file paths provided by the user.

CVE-1999-0045 - HIGH Severity (7.5) | Free CVE Database | 4nuxd