ID CVE-2000-1016 Type cve Reporter NVD Modified 2017-10-09T21:29:26
Description
The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL.
{"id": "CVE-2000-1016", "bulletinFamily": "NVD", "title": "CVE-2000-1016", "description": "The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL.", "published": "2000-12-11T00:00:00", "modified": "2017-10-09T21:29:26", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1016", "reporter": "NVD", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/5276", "http://www.securityfocus.com/bid/1707", "http://www.securityfocus.com/archive/1/84360"], "cvelist": ["CVE-2000-1016"], "type": "cve", "lastseen": "2017-10-10T10:34:38", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/o:suse:suse_linux:6.4", "cpe:/o:suse:suse_linux:6.3"], "cvelist": ["CVE-2000-1016"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "description": "The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL.", "edition": 1, "enchantments": {}, "hash": "a85d5747fcf32cd5766b1a5b25abc0339ac4c9cb22068de484b1f967d8158e83", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "81d12f5eab6d992fbfce40f17fc7b450", "key": "href"}, {"hash": "de05330d10a2716ec4b7f09675d000e0", "key": "title"}, {"hash": "632bdd3c167be47194c473f08fa5d092", "key": "description"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "0e10da4c566018d57c0e20d486dff81f", "key": "cpe"}, {"hash": "3c8e0bbc8310676965e264a6942fca29", "key": "published"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "44b87cd398c647ae882081aaacb729d4", "key": "cvelist"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "ef79f61e2fa16043502f4950d87fd02f", "key": "references"}, {"hash": "583e311ab82e8a329bdbebb94d4ffc17", "key": "modified"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1016", "id": "CVE-2000-1016", "lastseen": "2016-09-03T02:48:12", "modified": "2008-09-05T16:22:26", "objectVersion": "1.2", "published": "2000-12-11T00:00:00", "references": ["http://www.securityfocus.com/bid/1707", "http://www.securityfocus.com/archive/1/84360", "http://xforce.iss.net/static/5276.php"], "reporter": "NVD", "scanner": [], "title": "CVE-2000-1016", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T02:48:12"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "0e10da4c566018d57c0e20d486dff81f"}, {"key": "cvelist", "hash": "44b87cd398c647ae882081aaacb729d4"}, {"key": "cvss", "hash": "a792e2393dff1e200b885c5245988f6f"}, {"key": "description", "hash": "632bdd3c167be47194c473f08fa5d092"}, {"key": "href", "hash": "81d12f5eab6d992fbfce40f17fc7b450"}, {"key": "modified", "hash": "3d36574190c488750d699cf6251ca7ec"}, {"key": "published", "hash": "3c8e0bbc8310676965e264a6942fca29"}, {"key": "references", "hash": "60758b4ebb99b0a569266d284a7e2bd5"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "de05330d10a2716ec4b7f09675d000e0"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "d397d554348f01b7ce50f80f3b328cabab9e611be8fcda9e1024c7e0b9f349f9", "viewCount": 2, "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2017-10-10T10:34:38"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:20236"]}, {"type": "nessus", "idList": ["DOC_PACKAGE_BROWSEABLE.NASL"]}, {"type": "osvdb", "idList": ["OSVDB:417"]}], "modified": "2017-10-10T10:34:38"}, "vulnersScore": 5.0}, "objectVersion": "1.3", "cpe": ["cpe:/o:suse:suse_linux:6.4", "cpe:/o:suse:suse_linux:6.3"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"nessus": [{"lastseen": "2018-06-14T07:19:07", "bulletinFamily": "scanner", "description": "The /doc/packages directory is browsable. This directory contains the versions of the packages installed on this host. A remote attacker can use this information to mount further attacks.\nThis plugin has been deprecated. Webmirror3 (plugin ID 10662) will identify a browsable directory.", "modified": "2018-06-13T00:00:00", "published": "2000-09-25T00:00:00", "id": "DOC_PACKAGE_BROWSEABLE.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=10518", "title": "/doc/packages Directory Browsable (deprecated)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# @DEPRECATED@\n#\n# Disabled on 2016/04/01. Webmirror3.nbin will identify browsable\n# directories.\n\n# Script audit and contributions from Carmichael Security\n# Erik Anderson <eanders@carmichaelsecurity.com> (nb: this domain no longer exists)\n# Added BugtraqID and CVE\n#\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(10518);\n script_version (\"1.31\");\n script_cvs_date(\"Date: 2018/06/13 18:56:26\");\n\n script_cve_id(\"CVE-2000-1016\");\n script_bugtraq_id(1707);\n\n script_name(english:\"/doc/packages Directory Browsable (deprecated)\");\n script_summary(english:\"Checks if /doc/packages browsable.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"This plugin has been deprecated.\");\n script_set_attribute(attribute:\"description\", value:\n\"The /doc/packages directory is browsable. This directory contains the\nversions of the packages installed on this host. A remote attacker can\nuse this information to mount further attacks.\nThis plugin has been deprecated. Webmirror3 (plugin ID 10662) will\nidentify a browsable directory.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://seclists.org/bugtraq/2000/Sep/435\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Use access restrictions for the /doc directory. If you use Apache\nyou might use this in your access.conf:\n\n <Directory /usr/doc>\n AllowOverride None\n order deny,allow\n deny from all\n allow from localhost\n </Directory>\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2000/09/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2000/09/25\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.\");\n\n script_dependencie(\"find_service1.nasl\",\"doc_browsable.nasl\", \"http_version.nasl\");\n script_require_keys(\"www/doc_browseable\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\n# Deprecated.\nexit(0, \"This plugin has been deprecated. Webmirror3 (plugin ID 10662) will identify a browsable directory.\");\n\n#\n# The script code starts here\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:80);\n\ndir = \"/doc/packages/\";\nr = http_send_recv3(method:\"GET\", item: dir, port:port);\nif (isnull(r)) exit(0);\n\ncode = r[0];\nbuf = strcat(r[1], '\\r\\n', r[2]);\nbuf = tolower(buf);\nmust_see = \"index of /doc\";\n\n if((ereg(string:code, pattern:\"^HTTP/[0-9]\\.[0-9] 200 \"))&&(must_see >< buf))\n {\n \tsecurity_warning(port);\n\tset_kb_item( name: 'www/'+port+'/content/directory_index', value: dir);\n }\n\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-02T13:47:36", "bulletinFamily": "exploit", "description": "S.u.S.E. Linux 6.3/6.4 Installed Package Disclosure Vulnerability. CVE-2000-1016. Remote exploit for linux platform", "modified": "2000-09-21T00:00:00", "published": "2000-09-21T00:00:00", "id": "EDB-ID:20236", "href": "https://www.exploit-db.com/exploits/20236/", "type": "exploitdb", "title": "S.u.S.E. Linux 6.3/6.4 Installed Package Disclosure Vulnerability", "sourceData": "source: http://www.securityfocus.com/bid/1707/info\r\n\r\nBy submitting a specific url to the web server (\"http://hosts.any/doc/packages/\") , any user from any host may obtain a list of packages installed on a S.u.S.E 6.3 or 6.4 system. This problem is due to a configuration in the Apache httpd.conf supplied with S.u.S.E that permits anyone to request documents from this webroot subdirectory. The end result is that attackers will know what packages the victim has installed, which can assist in executing more complicated attacks.\r\n\r\nRequest \"http://target/doc/packages/\" with a web browser. ", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/20236/"}], "osvdb": [{"lastseen": "2017-04-28T13:19:55", "bulletinFamily": "software", "description": "# No description provided by the source\n\n## References:\nVendor URL: http://httpd.apache.org/\n[CVE-2000-1016](https://vulners.com/cve/CVE-2000-1016)\nBugtraq ID: 1707\n", "modified": "2000-09-21T00:00:00", "published": "2000-09-21T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:417", "id": "OSVDB:417", "type": "osvdb", "title": "Apache HTTP Server on SuSE Linux /doc/packages Remote Information Disclosure", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}]}