COMMAND
Zeus
SYSTEMS AFFECTED
Zeus Web Server 3.1.x and 3.3.x
PROBLEM
Vanja Hrustic found following. Sources of CGI scripts (and other
files) can be read by any user, if the '%00' string is appended
to the name of the CGI script. Following strings can also be
appended in order to reveal the source:
%G0
%W0
%EW
%FG
%UW
%VG
The Zeus Web server is vulnerable to a problem that allows remote
users to see the source of CGI scripts. Any user can append '%00'
to the name of the CGI script and view the source. Files in
directories that are configured to contain executable scripts
(/cgi-bin, for example) are not the subject to this problem.
This happens because the mime-type of '.cgi\0' does not map to
'application/x-httpd-cgi', so is instead served by the get module
as 'text/plain'. The webserver will ask the OS for the file
'script.cgi\0\0', and due to the zero-terminated string interface
of Unix, the OS will actually open 'script.cgi\0' instead of
returning a "file-not-found" error.
SOLUTION
Zeus Web Server 3.3.5a is not vulnerable. The fixed version is
available at:
ftp://ftp.zeustechnology.com/pub/products/z3
All customers are advised to upgrade.