Vulnerability Note VU#559616
Autonomy Ultraseek default configuration does not adequately restrict in-document highlighting
A vulnerability exists in the Ultraseek /highlight/index.html script. Successful exploitation of this vulnerability may allow an attacker to enumerate and access content from non-public servers or execute cross-site scripting attacks.
Ultraseek is a search engine used on private and public websites. Ultraseek includes the /highlight/index.html script which highlights strings in search results. An attacker may be able to exploit this vulnerability by sending specially-crafted URLs to the vulnerable script.
Note that Ultraseek was previously produced by Verity, which is now owned by Autonomy.
A remote, unauthenticated attacker could provide arbitrary content to a web site, effectively performing cross-site scripting attacks. An attacker could also access content from or enumerate non-public hosts and services.
Configure in-document highlighting filter
Specifies which URLs can be highlighted. By default, documents from all URLs can be highlighted. Ultraseek examines the list of URL patterns in the order they are specified. The first matched URL pattern determines whether in-documenting highlighting is allowed for documents originating from the specified URL. If there is no match, Ultraseek disallows highlighting on documents from the URL.
To change this setting:
Note that the default setting for new installations of Ultraseek 5.7 will set the in-document filter to only allow the highlighting features for the server's domain name. This change is documented as bugfix 1443 in the Ultraseek 5.7 release notes:
Restrict access to non-public services
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Verity, Inc.||Affected||16 Nov 2006||20 Nov 2006|
CVSS Metrics (Learn More)
This vulnerability was disclosed by TippingPoint.
This document was written by Jason McCormick and Ryan Giobbi.
- CVE IDs: CVE-2006-5819
- Date Public: 15 Nov 2006
- Date First Published: 01 Dec 2006
- Date Last Updated: 06 Dec 2006
- Severity Metric: 6.06
- Document Revision: 58
If you have feedback, comments, or additional information about this vulnerability, please send us email.