{"vuid":"VU#989580","idnumber":"989580","name":"Hummingbird CyberDOCS sets insecure permissions on script source code files","keywords":["Hummingbird","Cyberdocs","insecure permissions","inc file","source code disclosure","DocsFusion","SD017067"],"overview":"Hummingbird CyberDOCS running on Microsoft Internet Information Services (IIS) sets insecure permissions on script source code files. A remote attacker could read the contents of unprotected files.","clean_desc":"Hummingbird CyberDOCS (Hummingbird DM) is a web-based enterprise document management solution that runs on Windows NT/2000 using SQL database technology. CyberDOCS on IIS does not configure the web server to adequately restrict access to script source files.","impact":"An unauthenticated, remote attacker could read the script source code contained in files with insecure permissions. Script source code may contain sensitive information such as database credentials.","resolution":"Modify IIS file permissions\nAccording to Hummingbird: Start Internet Services Manager (IIS). Expand Default Web Site and select CyberDOCS. In the right-hand pane, select an unprotected file with the \".INC\" extension. Right-click and select Properties. On the File tab, clear the check mark from the \"Script source access,\" \"Read,\" and \"Write\" options. Click OK to save the changes. Repeat steps 3 to 5 for all remaining unprotected \"*.INC,\" \"*.ASA,\" \"*.LIC,\" \"*.LOG,\" \"*.Settings,\" and \"*.BAK\" files that should be protected. Repeat steps 3 to 6 for other sub-directories that also contain the above unprotected files. NOTE: This process will cause IIS to restart CyberDOCS resulting in all user sessions to be lost.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered and reported by \nProCheckUp","author":"This document was written by Art Manion.","public":["h","t","t","p",":","/","/","w","w","w",".","p","r","o","c","h","e","c","k","u","p",".","c","o","m","/","s","e","c","u","r","i","t","y","_","i","n","f","o","/","v","u","l","n","_","p","r","0","3","0","2",".","h","t","m","l"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-09-15T19:53:28Z","publicdate":"2003-10-06T00:00:00Z","datefirstpublished":"2003-10-09T22:03:36Z","dateupdated":"2003-10-10T13:29:52Z","revision":21,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"14","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"2","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"1.08","cam_scorecurrentwidelyknown":"1.44","cam_scorecurrentwidelyknownexploited":"2.64","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.08,"vulnote":null}