[NT] Texis Sensitive Information Leak
From: email@example.com To: firstname.lastname@example.org Date: 16 Mar 2003 14:26:57 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
In the US?
Contact Beyond Security at our new California office
housewarming rates on automated network vulnerability
scanning. We also welcome ISPs and other resellers!
Please contact us at: 323-882-8286 or email@example.com
- - - - - - - - -
Texis Sensitive Information Leak
<http://www.thunderstone.com/texis/site/pages> Thunderstone is an
independent R&D company that has been providing high-performance
state-of-the-art solutions to intelligent information retrieval and
management problems for over 21 years. The company's product provides
every full-text, SQL, multimedia management, and dynamic publishing
operation needed for an enterprise search application. A vulnerability in
the product allows attackers to cause it to reveal sensitive information
* Commercial Webinator Version 4.00 (Build 1017771124 of Apr 2, 2002)
The Texis program executes files written in Texis Web Script (a.k.a.
Vortex), a powerful web-server-side HTML programming language. It can be
invoked from the command line, or as a CGI program from the web server to
run scripts. By requesting specially crafted URLs, sensitive information
about the system will be displayed.
The information has been provided by <mailto:firstname.lastname@example.org>
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.