// For flags

CVE-2006-5819

Verity Ultraseek Request Proxying Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Verity Ultraseek before 5.7 allows remote attackers to use the server as a proxy for web attacks and host scanning via a direct request to the highlight/index.html script.

Verity Ultraseek anterior a 5.7 permite a un atacante remoto usar el servidor como proxy para ataques web y escaneo de host a través de respuesta directa a la secuencia de comandos highlight/index.html.

This vulnerability allows remote attackers to proxy web attacks and scan internal hosts through vulnerable installations of Verity Ultraseek. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the highlight script used to highlight search terms on spidered pages. An attacker can directly access the highlight script at '/highlight/index.html' to pass parameters to and retrieve content from arbitrary URLs. The same script can also be abused to enumerate otherwise inaccessible internal addresses and open ports.
Ultraseek also exposes various information disclosure vulnerabilities through the following scripts:
/help/urlstatusgo.html/help/header.html/help/footer.html/spell.html/coreforma.html/daterange.html/hits.html/hitsnavbottom.html/indexform.html/indexforma.html/languages.html/nohits.html/onehit1.html/onehit2.html/query.html/queryform0.html/queryform0a.html/queryform1.html/queryform1a.html/queryform2.html/queryform2a.html/quicklinks.html/relatedtopics.html/signin.html/subtopics.html/thesaurus.html/topics.html/hitspagebar.html/highlight/highlight.html/highlight/highlight_one.html/highlight/topnav.html
Authenticated Ultraseek users can further abuse another vulnerability to retrieve arbitrary file contents from the underyling server through the '/admin/logfile.txt' script.

*Credits: sullo / CIRT.net
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-11-08 CVE Reserved
  • 2006-11-15 CVE Published
  • 2024-01-13 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Verity
Search vendor "Verity"
Ultraseek
Search vendor "Verity" for product "Ultraseek"
<= 5.6.2
Search vendor "Verity" for product "Ultraseek" and version " <= 5.6.2"
-
Affected
Verity
Search vendor "Verity"
Ultraseek
Search vendor "Verity" for product "Ultraseek"
5.2.1
Search vendor "Verity" for product "Ultraseek" and version "5.2.1"
-
Affected
Verity
Search vendor "Verity"
Ultraseek
Search vendor "Verity" for product "Ultraseek"
5.5.0
Search vendor "Verity" for product "Ultraseek" and version "5.5.0"
-
Affected
Verity
Search vendor "Verity"
Ultraseek
Search vendor "Verity" for product "Ultraseek"
5.6.0
Search vendor "Verity" for product "Ultraseek" and version "5.6.0"
-
Affected
Verity
Search vendor "Verity"
Ultraseek
Search vendor "Verity" for product "Ultraseek"
5.6.1
Search vendor "Verity" for product "Ultraseek" and version "5.6.1"
-
Affected