Skip to main content

CVE-1999-0149: The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (

High
VulnerabilityCVE-1999-0149cve-1999-0149
Published: Sat Apr 19 1997 (04/19/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:11:09 UTC

Technical Analysis

CVE-1999-0149 is a high-severity vulnerability affecting the wrap CGI program on the IRIX operating system version 6.2, developed by SGI (Silicon Graphics, Inc.). The vulnerability arises from improper input validation in the wrap CGI script, which allows remote attackers to perform directory traversal attacks using '..' sequences. This enables attackers to bypass intended directory restrictions and view arbitrary directory listings on the affected system. Because the vulnerability is remotely exploitable without authentication (AV:N/AC:L/Au:N), an attacker can leverage this flaw over the network with low complexity (AC:L) and no user interaction. The impact includes unauthorized disclosure of directory contents, which compromises confidentiality (C:P), integrity (I:P), and availability (A:P) to some extent, as indicated by the CVSS vector. Although no known exploits are reported in the wild, the vulnerability is serious due to the potential exposure of sensitive file system information that could facilitate further attacks. A patch addressing this issue is available from SGI, distributed via their security advisories in 1997. Given the age of the vulnerability and the legacy nature of IRIX systems, active exploitation today is unlikely but remains a risk in environments still running unpatched IRIX 6.2 systems with the wrap CGI enabled.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the unauthorized disclosure of directory contents on systems running IRIX 6.2 with the vulnerable wrap CGI program. This could lead to exposure of sensitive configuration files, user data, or system binaries, enabling attackers to gather intelligence for further exploitation or lateral movement. Organizations in sectors such as research institutions, industrial design, or media production that historically used SGI IRIX systems may still have legacy infrastructure vulnerable to this issue. The compromise of confidentiality and integrity could result in data breaches, intellectual property theft, or disruption of critical services. Although IRIX is largely obsolete, any remaining deployments in European organizations represent a security risk, especially if these systems are connected to internal or external networks without adequate segmentation or monitoring.

Mitigation Recommendations

1. Immediate application of the official patch provided by SGI in the 1997 security advisory is the most effective mitigation. 2. If patching is not feasible, disable or restrict access to the wrap CGI program to prevent remote invocation. 3. Implement network-level controls such as firewall rules to block external access to IRIX systems or specifically to the CGI interface. 4. Employ network segmentation to isolate legacy IRIX systems from critical infrastructure and sensitive data environments. 5. Conduct thorough audits of existing IRIX deployments to identify any unpatched systems and assess exposure. 6. Monitor network traffic and system logs for unusual directory traversal attempts or unauthorized access patterns targeting CGI scripts. 7. Consider migrating legacy applications and services off IRIX platforms to supported operating systems to eliminate exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de68e

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:11:09 AM

Last updated: 8/17/2025, 4:23:18 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats