跳转到主内容

在连接器上检测到CVE-2000-0649

Views:
13
Visibility:
Public
Votes:
0
Category:
cloud-manager
Specialty:
bluexp<a>2009973141</a>
Last Updated:

适用场景

  • BlueXP
  • 连接器
  • CVE-2000-0649

问题描述

在运行 SM1修补程序的连接器3.9.36/1版上检测到CVE-2000-0649
 

调查结果:

端口80和443上的Web服务器HTTP标头内部IP泄露。

 

证据:
Nessus was able to exploit the issue using the following request :

GET //IgOo5nQ0.asp HTTP/1.0
Accept-Charset: iso-8859-1,utf-8;q=0.9,*;q=0.1
Accept-Language: en
Connection: Close
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Pragma: no-cache
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*

 

This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
Date: Sun, 10 Mar 2024 14:15:19 GMT
Cache-Control: public,max-age=31536000
X-FRAME-Options: SAMEORIGIN
Location: https://10.5.20.4
Content-Length: 0
Server: Jetty(9.4.52.v20230823)

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.