NAI Net Tools PKI Server Directory Traversal Vulnerability

BID:1537

Info

NAI Net Tools PKI Server Directory Traversal Vulnerability

Bugtraq ID: 1537
Class: Input Validation Error
CVE:
Remote: Yes
Local: Yes
Published: Aug 02 2000 12:00AM
Updated: Aug 02 2000 12:00AM
Credit: This vulnerability was discovered and detailed in an advisory (attached beneath) by CORE SDI, in particular by Juliano Rizzo <[email protected]>. Disclaimer: CORE SDI serve as SecurityFocus.com's network security auditors. SecurityFocus.com was in n
Vulnerable: Network Associates Net Tools PKI Server 1.0 Hotfix2
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
Network Associates Net Tools PKI Server 1.0 Hotfix1
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
Network Associates Net Tools PKI Server 1.0
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
Not Vulnerable:

Discussion

NAI Net Tools PKI Server Directory Traversal Vulnerability

Certain versions of Network Associates Inc.'s Net Tools PKI (Public Key Infrastructure) server ship with a vulnerability which allows remote attackers to read any file in the system which the PKI server resides. The problem lies within the webserver component of the PKI server (strong.exe) which operates several 'virtual servers' required to operate the PKI server. The first is the Administrative Web Server which listens via TCP port 443, the second is Enrollment Web Server which listens on TCP port 444. Unlike the Administrative Web Server the Enrollment Web Server does not require credentials to be exchanged before a user can talk to the webserver. It is via this virtual server that an attacker can exploit the problem at hand.

The problem in particular is a failure on behalf of the web server to enforce a web root directory. Therefore, a user may walk the entire directory tree of the target host and view files of which they know the locations. Autoexec.bat for example, backup SAM files etc.

By default the enrollment server uses \Program Files\Network Associates\Net Tools PKI Server\WebServer\enroll-server as the Web Root directory. In a properly written webserver a user should only be able to move forward in the tree not backward.

Exploit / POC

NAI Net Tools PKI Server Directory Traversal Vulnerability

As detailed in the CORE SDI advisory on this issue:

https://host:444/..\..\..\..\..\autoexec.bat

Solution / Fix

NAI Net Tools PKI Server Directory Traversal Vulnerability

Solution:
Network Associates has released a fix for this problem. Furthermore CORE SDI has detailed a way to check if this exploit has been attempted against your installation, as per the CORE SDI advisory (attached in full in the 'Credit' section):

To determine whether anyone has attempted to exploit this vulnerability, check the enroll-access.log and the admin-access.log files in the WebServer/logs directory of your Net Tools PKI Server installation. Search for any log entries containing "..\" within them. Each log entry can then be examined to see the IP address of the computer that submitted the request.


Network Associates Net Tools PKI Server 1.0

Network Associates Net Tools PKI Server 1.0 Hotfix1

Network Associates Net Tools PKI Server 1.0 Hotfix2

References

NAI Net Tools PKI Server Directory Traversal Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report