CVE-1999-0937

HIGH10.0/ 10.0
Share:
Published: December 3, 1998 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

BNBForm allows remote attackers to read arbitrary files via the automessage hidden form variable.

CVSS Metrics

Base Score
10.0
Severity
HIGH
Vector String
AV:N/AC:L/Au:N/C:C/I:C/A:C

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

BNBForm is vulnerable to a critical arbitrary file read vulnerability, allowing attackers to access sensitive information on the server. Exploiting the automessage form variable, attackers can retrieve any file accessible to the web server's user, potentially leading to data breaches and system compromise.

02 // Vulnerability Mechanism

Step 1: Craft the Request: The attacker crafts an HTTP request, typically a GET or POST request, to the BNBForm application.

Step 2: Payload Insertion: The attacker includes the automessage form variable in the request. The value of this variable is crafted to be a path traversal payload, such as ../../../../etc/passwd.

Step 3: Request Submission: The attacker submits the crafted request to the vulnerable BNBForm application.

Step 4: Vulnerability Trigger: BNBForm processes the request, and the automessage variable's value is used to determine which file to read or include.

Step 5: File Retrieval: Due to the lack of input validation, the application reads the file specified by the attacker-controlled path (e.g., /etc/passwd).

Step 6: Information Disclosure: The contents of the requested file (e.g., /etc/passwd) are returned in the HTTP response, revealing sensitive information.

03 // Deep Technical Analysis

The vulnerability stems from a lack of input validation and sanitization of the automessage form variable in BNBForm. The application directly uses the user-supplied value of automessage to construct a file path or include a file, without proper checks to prevent path traversal. This allows an attacker to specify a path outside the intended directory, leading to the disclosure of sensitive files such as configuration files, password files, or other confidential data. The root cause is a missing or inadequate implementation of secure coding practices, specifically related to handling user-supplied input.

CVE-1999-0937 - HIGH Severity (10) | Free CVE Database | 4nuxd