Hi,

Following a scan of web server with Qualys Community Edition, a
vulnerability has been declared as below.
------------------------------------------------------------------------------------------------------------

Web Server Internal IP Address/Internal Network Name Disclosure
Vulnerability   port 80/tcp


QID:
    86247
Category:
    Web server
CVE ID:
    CVE-2000-0649
Vendor Reference
    -
Bugtraq ID:
    1499
Service Modified:
    10/01/2018
User Modified:
    -
Edited:
    No
PCI Vuln:
    Yes

RESULTS:
    GET / HTTP/1.0



    HTTP/1.0 302 Found
    Date: Fri, 01 Mar 2019 15:08:31 GMT
    Server: OpenBSD httpd
    Connection: close
    Content-Type: text/html
    Content-Length: 419
    Location: https://192.168.1.101/


THREAT:
    Some Web servers contain a vulnerability giving remote attackers
the ability to attain your internal IP address or internal network
name.

    An attacker connected to a host on your network using HTTPS
(typically on port 443) could craft a specially formed GET request
from the Web server resulting in a 3XX Object Moved error message
containing the internal IP address or internal network name of the Web
server.

    A target host using HTTP may also be vulnerable to this issue.

    QID Detection Logic:
    The remote check for the web server internal IP address sends a
HTTP GET request to the target web server. The QID is flagged if a
"Content-location:" header or a 3xx redirect address in an HTTP
response contains an RFC1918 IP address.

    PCI DSS 3.2 requirement 1.3.7 "do not disclose private IP
addresses and routing information to unauthorized parties".
    This is a PCI Fail since confidential information about your
network is leaked.

IMPACT:
    Successful exploitation of this vulnerability results in the
disclosure of your internal IP address or internal network name, which
could then be used in further attacks against the target host.
SOLUTION:
    There are no patches available at this time. Please contact your
vendor for updates.

    Workaround:

    For IIS Web Server 6.x and prior:
    Check the Microsoft article on how to set the Hostname instead of
internal IP address for IIS.

    For IIS 7.0
    The release version of IIS7 by default includes the functionality
of masking the IP address. Refer to Removing an IIS server's IP
address from HTTP responses.

    For Apache Web Server:
    Modify the Apache configuration file as follows:
    - Set "ServerName" to a proper FQDN.
    or
    - Use module mod_rewrite to modify the 3xx error message returned
by the server.

    No workaround information is available for other Web servers at
this time. Refer to your vendor for an appropriate workaround.
COMPLIANCE:
    Not Applicable
EXPLOITABILITY:

    The Exploit-DB

    Reference:
        CVE-2000-0649
    Description:
        Microsoft IIS 2.0/3.0/4.0/5.0/5.1 - Internal IP Address
Disclosure - The Exploit-DB Ref : 20096
    Link:
        http://www.exploit-db.com/exploits/20096

ASSOCIATED MALWARE:
    There is no malware information for this vulnerability.

RESULTS:
    GET / HTTP/1.0



    HTTP/1.0 302 Found
    Date: Fri, 01 Mar 2019 15:08:31 GMT
    Server: OpenBSD httpd
    Connection: close
    Content-Type: text/html
    Content-Length: 419
    Location: https://192.168.1.101/
------------------------------------------------------------------------------------------------------------
Web server configuration as follows:

        # $OpenBSD: httpd.conf,v 1.20 2018/06/13 15:08:24 reyk Exp $

        server "xyz.com" {
                listen on * port 80
                location "/.well-known/acme-challenge/*" {
                        root "/acme"
                        request strip 2
                }
                location * {
                        block return 302 "https://$HTTP_HOST$REQUEST_URI";
                }
        }

        server "xyz.com" {
                listen on * tls port 443
                hsts
                tls {
                        certificate "/etc/ssl/xyz.com.fullchain.pem"
                        key "/etc/ssl/private/xyz.com.key"
                }
                location "/.well-known/acme-challenge/*" {
                        root "/acme"
                        request strip 2
                }
                location "/xyz.com/*" {
                        root "/"
                        fastcgi
                }
        }

Any indications on how to prevent the disclosure?

Regards,

Kihaguru.

Reply via email to