CVE-2002-1634

MEDIUM5.0/ 10.0
Share:
Published: December 31, 2002 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Novell NetWare 5.1 installs sample applications that allow remote attackers to obtain sensitive information via (1) ndsobj.nlm, (2) allfield.jse, (3) websinfo.bas, (4) ndslogin.pl, (5) volscgi.pl, (6) lancgi.pl, (7) test.jse, or (8) env.pl.

CVSS Metrics

Base Score
5.0
Severity
MEDIUM
Vector String
AV:N/AC:L/Au:N/C:P/I:N/A:N

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Novell NetWare 5.1 servers are vulnerable to information disclosure attacks through several sample applications, potentially exposing sensitive data like user credentials and network configuration. Successful exploitation allows attackers to gather critical information, enabling further attacks and compromising the network's security. This vulnerability requires immediate attention due to its potential for severe impact.

02 // Vulnerability Mechanism

Step 1: Reconnaissance: The attacker identifies a vulnerable Novell NetWare 5.1 server, likely through port scanning (e.g., port 80 for HTTP) or other reconnaissance techniques.

Step 2: Vulnerability Identification: The attacker identifies the presence of the vulnerable sample applications (ndsobj.nlm, allfield.jse, websinfo.bas, ndslogin.pl, volscgi.pl, lancgi.pl, test.jse, or env.pl) on the server.

Step 3: Payload Delivery: The attacker crafts a specific HTTP request to one of the vulnerable applications. The request is designed to trigger the application to reveal sensitive information.

Step 4: Information Disclosure: The vulnerable application processes the attacker's request and returns the requested sensitive information (e.g., user credentials, network configuration, directory services data) in the response.

Step 5: Post-Exploitation: The attacker uses the gathered information to plan and execute further attacks, such as privilege escalation, lateral movement, or data exfiltration.

03 // Deep Technical Analysis

The vulnerability stems from the installation of sample applications with inadequate access controls. These applications, written in various scripting languages (NLM, JSE, BAS, Perl), and CGI scripts, lack proper input validation and authorization checks. This allows remote attackers to directly request sensitive information from the server, such as directory services data, environment variables, and network configuration details. The root cause is the insecure design of these sample applications, which were intended for demonstration purposes but were installed by default and accessible without authentication. The lack of proper sanitization of user-supplied input allows attackers to craft specific requests to retrieve sensitive information. The specific flaw lies in the absence of access control mechanisms within the sample applications. The applications are designed to provide information without requiring authentication, making them easily exploitable.

References & Intelligence

http://support.novell.com/cgi-bin/search/searchtid.cgi?/10064452.htm
Source: cve@mitre.org
ExploitPatch
http://www.kb.cert.org/vuls/id/159203
Source: cve@mitre.org
PatchUS Government Resource
http://www.osvdb.org/17461
Source: cve@mitre.org
http://www.osvdb.org/17462
Source: cve@mitre.org
http://www.osvdb.org/17463
Source: cve@mitre.org
http://www.osvdb.org/17464
Source: cve@mitre.org
http://www.osvdb.org/17465
Source: cve@mitre.org
http://www.osvdb.org/17466
Source: cve@mitre.org
http://www.osvdb.org/17467
Source: cve@mitre.org
http://www.osvdb.org/17468
Source: cve@mitre.org
http://www.procheckup.com/security_info/vuln_pr0201.html
Source: cve@mitre.org
http://www.procheckup.com/security_info/vuln_pr0203.html
Source: cve@mitre.org
http://www.securityfocus.com/advisories/4157
Source: cve@mitre.org
ExploitPatch
http://www.securityfocus.com/advisories/4158
Source: cve@mitre.org
ExploitPatch
http://www.securityfocus.com/bid/4874
Source: cve@mitre.org
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/9212
Source: cve@mitre.org
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10064452.htm
Source: af854a3a-2127-422b-91ae-364da2661108
ExploitPatch
http://www.kb.cert.org/vuls/id/159203
Source: af854a3a-2127-422b-91ae-364da2661108
PatchUS Government Resource
http://www.osvdb.org/17461
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/17462
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/17463
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/17464
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/17465
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/17466
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/17467
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/17468
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.procheckup.com/security_info/vuln_pr0201.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.procheckup.com/security_info/vuln_pr0203.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/advisories/4157
Source: af854a3a-2127-422b-91ae-364da2661108
ExploitPatch
http://www.securityfocus.com/advisories/4158
Source: af854a3a-2127-422b-91ae-364da2661108
ExploitPatch
http://www.securityfocus.com/bid/4874
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/9212
Source: af854a3a-2127-422b-91ae-364da2661108
CVE-2002-1634 - MEDIUM Severity (5) | Free CVE Database | 4nuxd