{"vuid":"VU#117139","idnumber":"117139","name":"Sambar Web Server vulnerable to sourcecode disclosure due to improper parsing of scripts","keywords":["Sambar Web Server","sourcecode","improper parsing of scripts","null"],"overview":"Sambar Webserver displays script contents instead of interpreting them when the user adds certain characters to the end of the script URL.","clean_desc":"Sambar Webserver is designed to handle CGI requests by interpreting CGI scripts to produce output returned to the client. However, due to flaws in Sambar Webserver's URL parsing, it is possible to trick the server into into thinking that a CGI script is a regular file and serving the script's contents instead of interpreting the script. This problem occurs when the client adds a space and a null byte to the end of the script URL.","impact":"Attackers can access information that may be considered sensitive, including usernames or passwords contained in CGI scripts.","resolution":"Apply a patch from your vendor Upgrade to version 5.2b, available at: http://sambar.dnsalias.org/win32-preview.tar.gz","workarounds":"Remove all CGI scripts from the server, or limit the sensitive information in your CGI scripts.","sysaffected":"","thanks":"The content of this document is based on information provided by Peter Gründl.","author":"This document was written by Shawn Van Ittersum and Jeffrey P. Lanza.","public":["http://www.sambar.com","http://sambar.dnsaloas.org/win32-preview.tar.gz","http://www.securityfocus.com/bid/4533"],"cveids":["CVE-2002-0737"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-04-17T19:51:29Z","publicdate":"2002-04-17T00:00:00Z","datefirstpublished":"2002-07-29T20:39:53Z","dateupdated":"2003-05-19T23:32:23Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"4","cam_impact":"8","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.56","cam_scorecurrentwidelyknown":"5.76","cam_scorecurrentwidelyknownexploited":"10.56","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.56,"vulnote":null}