ID CVE-2005-2008
Summary Yaws Webserver 1.55 and earlier allows remote attackers to obtain the source code for yaws scripts via a request to a yaw script with a trailing %00 (null).
References
Vulnerable Configurations
  • cpe:2.3:a:yaws:webserver:1.50
    cpe:2.3:a:yaws:webserver:1.50
  • cpe:2.3:a:yaws:webserver:1.51
    cpe:2.3:a:yaws:webserver:1.51
  • cpe:2.3:a:yaws:webserver:1.52
    cpe:2.3:a:yaws:webserver:1.52
  • cpe:2.3:a:yaws:webserver:1.53
    cpe:2.3:a:yaws:webserver:1.53
  • cpe:2.3:a:yaws:webserver:1.54
    cpe:2.3:a:yaws:webserver:1.54
  • cpe:2.3:a:yaws:webserver:1.55
    cpe:2.3:a:yaws:webserver:1.55
CVSS
Base: 5.0 (as of 21-06-2005 - 16:37)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
nessus via4
NASL family Web Servers
NASL id YAWS_SOURCE_DISCLOSURE.NASL
description The remote host is running the Yaws web server. The remote version of this software is vulnerable to a source code disclosure issue. By requesting a '.yaws' script following by %00, an attacker may force the remote server to disclose the source code of that script. Since scripts may contain sensitive information such as logins and passwords, an attacker may exploit this flaw to obtain some credentials on the remote host or a better understanding of the security of the '.yaws' scripts.
last seen 2019-02-21
modified 2018-11-15
plugin id 18522
published 2005-06-17
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=18522
title Yaws Web Server .yaws Script Null Byte Request Source Code Disclosure
refmap via4
bugtraq 20050617 Source Code Disclosure in Yaws Webserver <1.56
confirm http://yaws.hyber.org/yaws-1.55_to_1.56.patch
osvdb 17375
secunia 15740
Last major update 17-10-2016 - 23:24
Published 17-06-2005 - 00:00
Back to Top