Lucene search

K

ntop.advisory.txt

🗓️ 02 Aug 2000 00:00:00Reported by Cho Kyong-wonType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 23 Views

ntop web mode vulnerability allows unauthorized access to traffic information and files.

Show more
Code
`================================================================================  
  
[ Hackerslab bug_paper ] ntop web mode vulnerabliity  
  
================================================================================  
  
  
  
Command : /sbin/ntop -w <port>  
  
  
SYSTEM : N/A  
  
  
INFO :  
  
ntop - display top network users   
  
  
-w  
Starts ntop  
in web mode. Users can attach their web  
browsers to the specified port and browse traffic infor­  
mation remotely. Supposing to start ntop  
at the port 3000  
(ntop -w 3000), the URL to access is http://host­  
name:3000/. The file ~/.ntop specifies the HTTP  
user/password of those people who are allowed to access  
ntop. If the ~/.ntop file is missing no security will be  
used hence everyone can access traffic information. A  
simple .ntop file is the following: # # .ntop File format  
# # user<tab>/<space>pw # # luca linux Please note  
that an HTTP server is NOT needed in order to use the  
program in interactive mode.* 'bdf' program has SUID permission.  
  
  
If use 'ntop' in web mode, it's web root is "/etc/ntop/html".  
  
It's web mode is not check URL path.  
  
So if URL is "http://URL:port/../../shadow", remote user will read all file.  
  
"everyone can access traffic information" !!!  
  
If ntop use for public, anyone read all files.  
  
==-------------------------------------------------------------------------------==  
*********  
* ** ** *  
* ** ** *  
* ******* *  
* ** ** * [email protected]  
* ** ** * [ http://www.hackerslab.org ]  
********* HACKERSLAB (C) since 2000  
==-------------------------------------------------------------------------------==  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
02 Aug 2000 00:00Current
7.4High risk
Vulners AI Score7.4
23
.json
Report