COMMAND

    Sojourn Search Engine

SYSTEMS AFFECTED

    Any web server running this search engine

PROBLEM

    Cerberus  Security  Team  found  following  (CISADV000313).    The
    Cerberus  Security  Team   has  discovered  a   weakness  in   the
    commercial search  engine Sojourn  that allows  attackers to  read
    any local file on  the file system that  they have read access  to
    (as provided by the account the web server is running under).   As
    such, files such  as /etc/passwd on  Unix systems can  be read and
    files such as the global.asa on Windows NT and 2000.

    Part of the  functionality provided by  the Sojourn search  engine
    allows the admin  of a website  to group sites  and information in
    categories and  a web  user can  then search  that category with a
    request of:

        http://charon/cgi-bin/sojourn.cgi?cat=Arts

    These categories are  actually stored as  .txt files ->  Arts.txt.
    The ".txt" is appended to the  end of the "cat" parameter and  the
    file is then opened and its contents returned.  However the search
    engine will  follow double  dots allowing  us to  break out of the
    web servers virtual  root. At first  glance it may  seem that only
    .txt files will  be accessible, however,  by placing a  %00 on the
    end of the "cat" parameter  we can effectively cut off  the ".txt"
    thus being able to open any file. For example

        http://charon/cgi-bin/sojourn.cgi?cat=../../../../../../etc/passwd%00

    will display the contents of the passwd file on UNIX boxes.

SOLUTION

    The vendor  was informed  and they  have addressed  their code and
    this now  appears to  be fixed.  Until the  update can be obtained
    Cerberus suggests that this search engine be temporarily  disabled
    or removed.  A check has been added into CIS security scanner.