search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OPeNDAP filesystem enumeration vulnerability

Vulnerability Note VU#671028

Original Release Date: 2007-05-18 | Last Revised: 2007-05-21


The OPeNDAP server version 4 contains a file enumeration vulnerability. This vulnerability may allow an attacker to enumerate filesystem contents.


OPeNDAP is a software package designed to help researchers exchange data sets that are stored in different formats. The most recent version of OPeNDAP is server 4, or Hyrax.

From the Hyrax download page:

Hyrax is the next generation server from OPeNDAP. It utilizes a modular design that employs a light weight Java servlet (aka OLFS) to provide the public-accessible client interface, and a back-end daemon, the BES to handle the heavy lifting. The BES uses the same handlers that are used with Server3 (also know as the CGI Server) but loads those at run time.

The Hyrax server may allow users to enumerate the server's filesystem contents.


A remote, unauthenticated attacker may be able to view the contents of the server's filesystem.


The OpenDAP team has released an update, BES 3.5.0, to address this issue. Administrators are encouraged to upgrade as soon as possible.

Vendor Information


OPeNDAP, Inc. Affected

Notified:  May 02, 2007 Updated: May 18, 2007



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


See for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to NCIRT labs for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 0.13
Date Public: 2007-05-14
Date First Published: 2007-05-18
Date Last Updated: 2007-05-21 19:04 UTC
Document Revision: 18

Sponsored by CISA.