{"vuid":"VU#671028","idnumber":"671028","name":"OPeNDAP filesystem enumeration vulnerability","keywords":["OPenNDAP","filesystem","enumeration"],"overview":"The OPeNDAP server version 4 contains a file enumeration vulnerability. This vulnerability may allow an attacker to enumerate filesystem contents.","clean_desc":"OPeNDAP is a software package designed to help researchers exchange data sets that are stored in different formats. The most recent version of OPeNDAP is server 4, or Hyrax. From the Hyrax download page: Hyrax is the next generation server from OPeNDAP. It utilizes a modular design that employs a light weight Java servlet (aka OLFS) to provide the public-accessible client interface, and a back-end daemon, the BES to handle the heavy lifting. The BES uses the same handlers that are used with Server3 (also know as the CGI Server) but loads those at run time. The Hyrax server may allow users to enumerate the server's filesystem contents.","impact":"A remote, unauthenticated attacker may be able to view the contents of the server's filesystem.","resolution":"Upgrade\nThe OpenDAP team has released an update, BES 3.5.0, to address this issue. Administrators are encouraged to upgrade as soon as possible.","workarounds":"","sysaffected":"","thanks":"Thanks to NCIRT labs for reporting this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://www.opendap.org/security.html","http://www.opendap.org/download/hyrax.html","http://secunia.com/advisories/25319/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-02T13:41:55Z","publicdate":"2007-05-14T00:00:00Z","datefirstpublished":"2007-05-18T19:11:31Z","dateupdated":"2007-05-21T19:04:44Z","revision":18,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"1","cam_population":"3","cam_impact":"3","cam_easeofexploitation":"19","cam_attackeraccessrequired":"20","cam_scorecurrent":"0.12825","cam_scorecurrentwidelyknown":"1.346625","cam_scorecurrentwidelyknownexploited":"2.629125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.12825,"vulnote":null}