{"vuid":"VU#936507","idnumber":"936507","name":"Oracle 9iAS allows access to CGI script source code within CGI-BIN directory","keywords":["Oracle 9iAS","perl","source code","scripts","CGI-BIN","alias","virtual directory"],"overview":"Oracle 9i Application Server (9iAS) allows remote anonymous users to view source code in CGI scripts stored in the Apache cgi-bin. Attackers may analyze these scripts to discover usernames, passwords, or other proprietary data or methods.","clean_desc":"The default Apache configuration file in Oracle 9iAS provides a Location alias from \"/perl\" to \"/cgi-bin\". Because this alias is not defined as a ScriptAlias, documents accessed through the \"/perl\" alias are not interpreted as scripts should be. Instead, the server simply outputs the contents of the document.","impact":"Attackers may read the source code of CGI scripts by requesting them through the \"/perl\" alias. Attackers may analyze source code to discover usernames, passwords, or other proprietary data or methods.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"Edit the \"httpd.conf\" file to change the \"/perl\" alias into a ScriptAlias.","sysaffected":"","thanks":"Thanks to David Litchfield for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.nextgenss.com/papers/hpoas.pdf","http://otn.oracle.com/deploy/security/alerts.htm"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-02-27T00:35:08Z","publicdate":"2002-01-10T00:00:00Z","datefirstpublished":"2002-02-27T00:35:43Z","dateupdated":"2002-03-05T22:28:29Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.25","cam_scorecurrentwidelyknown":"13.5","cam_scorecurrentwidelyknownexploited":"22.5","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.25,"vulnote":null}