Overview
Oracle 9i Application Server (9iAS) allows remote anonymous users to view source code in CGI scripts stored in the Apache cgi-bin. Attackers may analyze these scripts to discover usernames, passwords, or other proprietary data or methods.
Description
| The default Apache configuration file in Oracle 9iAS provides a Location alias from "/perl" to "/cgi-bin". Because this alias is not defined as a ScriptAlias, documents accessed through the "/perl" alias are not interpreted as scripts should be. Instead, the server simply outputs the contents of the document. | 
Impact
| Attackers may read the source code of CGI scripts by requesting them through the "/perl" alias. Attackers may analyze source code to discover usernames, passwords, or other proprietary data or methods. | 
Solution
| The CERT/CC is currently unaware of a practical solution to this problem. | 
| Edit the "httpd.conf" file to change the "/perl" alias into a ScriptAlias. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Thanks to David Litchfield for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 11.25 | 
| Date Public: | 2002-01-10 | 
| Date First Published: | 2002-02-27 | 
| Date Last Updated: | 2002-03-05 22:28 UTC | 
| Document Revision: | 8 |