TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
50
Signature ID: 273
GroupWise Web Interface 'HELP' path disclosure vulnerability
Threat Level: Warning
Industry ID: CVE-1999-1005 Bugtraq: 879 Nessus: 10877
Signature Description: GroupWise is a cross-platform collaborative software product from Novell, Inc. offering e-mail,
calendaring, instant messaging and document management. GroupWise includes a web access component for use
through a web browser. Novell Groupwise 5.2 to 5.5(inclusive), the HELP function in GWWEB.EXE will reveal the
physical path of the web server root directory. An attacker can use this information to make more focused attacks.
Signature ID: 274
GroupWise Web Interface 'HELP' file disclosure vulnerability
Threat Level: Warning
Industry ID: CVE-1999-1005 Bugtraq: 879 Nessus: 10877
Signature Description: GroupWise is a cross-platform collaborative software product from Novell, Inc. offering e-mail,
calendaring, instant messaging and document management. GroupWise includes a web access component for use
through a web browser. Novell Groupwise 5.2 to 5.5(inclusive), the HELP function in GWWEB.EXE is vulnerable to a
file disclosure vulnerability that can be exploited with a '../' character sequence. A malicious user can access any
‘.htm’ file on the server and browse directory listings. An attacker can use this information to make more
focused attacks.
Signature ID: 275
Finger cgi vulnerability
Threat Level: Severe
Industry ID: CVE-1999-0612 Nessus: 10071,10068
Signature Description: The Common Gateway Interface (CGI) is a standard protocol for interfacing external
application software with an information server, commonly a web server. The Finger command shows user
information. If the ‘finger’ command is installed in the cgi-bin directory, it may give sensitive user
information to a malicious user. An attacker can use this information to make more focused attacks.
Signature ID: 277
Unify eWave ServletExec 3.0C file upload vulnerability
Threat Level: Severe
Industry ID: CVE-2000-1024
Bugtraq: 1876 Nessus: 10570
Signature Description: Unify eWave ServletExec is a Java/Java Servlet engine plug-in for major web servers like
Microsoft IIS, Apache and Netscape Enterprise Server. Unify eWave ServletExec 3.0 c contains an unregistered servlet
called 'UploadServlet' whose access is not restricted. By sending a specially formed HTTP 'GET' or 'POST' request, it
is possible for a remote user to upload any file to any directory on the web server. Successful exploitation of this
vulnerability could lead to a compromise of the web server.
Signature ID: 278
Authentication bypass in Lotus Domino database access vulnerability
Threat Level: Warning
Industry ID: CVE-2001-1567
Bugtraq: 4022 Nessus: 10953
Signature Description: Lotus Domino Server is an application framework for web based collaborative software. It runs
on multiple platforms. Lotus Domino 5.0.9 a and earlier convert '+' characters in a file request to a ' ' characters. By
requesting a Notes template files (.ntf) or a Notes Database files (.nsf) with a maliciously constructed file name having
a a certain number of "+" characters before the .nsf file extension, remote attackers can bypass security restrictions and
view sensitive information in these files.