Lucene search

K
certCERTVU:559616
HistoryDec 01, 2006 - 12:00 a.m.

Autonomy Ultraseek default configuration does not adequately restrict in-document highlighting

2006-12-0100:00:00
www.kb.cert.org
14

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.133 Low

EPSS

Percentile

95.5%

Overview

A vulnerability exists in the Ultraseek /highlight/index.html script. Successful exploitation of this vulnerability may allow an attacker to enumerate and access content from non-public servers or execute cross-site scripting attacks.

Description

Ultraseek is a search engine used on private and public websites. Ultraseek includes the /highlight/index.html script which highlights strings in search results. An attacker may be able to exploit this vulnerability by sending specially-crafted URLs to the vulnerable script.

Note that Ultraseek was previously produced by Verity, which is now owned by Autonomy.


Impact

A remote, unauthenticated attacker could provide arbitrary content to a web site, effectively performing cross-site scripting attacks. An attacker could also access content from or enumerate non-public hosts and services.


Solution

Configure in-document highlighting filter
From the Ultraseek Administrator Guide:
In-document highlighting filter

Specifies which URLs can be highlighted. By default, documents from all URLs can be highlighted. Ultraseek examines the list of URL patterns in the order they are specified. The first matched URL pattern determines whether in-documenting highlighting is allowed for documents originating from the specified URL. If there is no match, Ultraseek disallows highlighting on documents from the URL.
Changing this setting to restrict highlighting to specific domains will limit the scope of this vulnerability.

To change this setting:

  1. Log into the server as the admin user.
  2. Click on the parameters tab.
  3. Click on the advanced tab.
  4. In the In-document highlighting filter text box, enter the domains that should be allowed to access the highlighting features.

Note that the default setting for new installations of Ultraseek 5.7 will set the in-document filter to only allow the highlighting features for the server’s domain name. This change is documented as bugfix 1443 in the Ultraseek 5.7 release notes:

[1443] __ The default filters for document highlighting are now more restrictive, automatically limited to either the current domain, or the collection URL filters.

Restrict access to non-public services

Using access control lists, firewalls or similar technologies to restrict access to the highlighting script can limit an attacker’s ability to access non-public services.


Vendor Information

559616

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Verity, Inc. Affected

Notified: November 16, 2006 Updated: November 20, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

This vulnerability was disclosed by TippingPoint.

This document was written by Jason McCormick and Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-5819
Severity Metric: 6.06 Date Public:

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.133 Low

EPSS

Percentile

95.5%

Related for VU:559616