COMMAND

    Zeus

SYSTEMS AFFECTED

    Zeus Web Server 3.1.x and 3.3.x

PROBLEM

    Vanja Hrustic found following.  Sources of CGI scripts (and  other
    files) can be read  by any user, if  the '%00' string is  appended
    to the  name of  the CGI  script.   Following strings  can also be
    appended in order to reveal the source:

        %G0
        %W0
        %EW
        %FG
        %UW
        %VG

    The Zeus Web server is vulnerable to a problem that allows  remote
    users to see the source of CGI scripts.  Any user can append '%00'
    to  the  name  of  the  CGI  script  and view the source. Files in
    directories  that  are  configured  to  contain executable scripts
    (/cgi-bin, for example) are not the subject to this problem.

    This happens  because the  mime-type of  '.cgi\0' does  not map to
    'application/x-httpd-cgi', so is instead served by the get  module
    as  'text/plain'.   The  webserver  will  ask  the OS for the file
    'script.cgi\0\0', and due to the zero-terminated string  interface
    of  Unix,  the  OS  will  actually  open 'script.cgi\0' instead of
    returning a "file-not-found" error.

SOLUTION

    Zeus Web Server  3.3.5a is not  vulnerable.  The  fixed version is
    available at:

        ftp://ftp.zeustechnology.com/pub/products/z3

    All customers are advised to upgrade.