Home page logo
/

bugtraq logo Bugtraq mailing list archives

Keene Digital Media Server Directory Traversal
From: "GulfTech Security" <security () gulftech org>
Date: Wed, 25 Aug 2004 19:54:46 -0500

##########################################################
# GulfTech Security Research              August, 25th 2004
##########################################################
# Vendor  : Keene Software
# URL     : http://www.keenesoftware.com
# Version : Keene Digital Media Server 1.0.2
# Risk    : Directory Traversal Vulnerability
##########################################################

Description:
Keene Digital Media Server is an easy and affordable way to 
share all things digital with friends, family, and customers 
over your broadband connection. DMS turns your computer into 
a highly secure Web server that automatically converts your 
files and folders into Web pages, thumbnails, and media shows 
with no Web programming required. Integrated user and file 
access security management provide the ultimate control over 
your content.


Directory Traversal Vulnerability:
Not too long ago I saw there was a directory traversal vuln
found in Keene Digital Media Server. it was fixed by the
developers, but

http://localhost/%2E%2E%5Csystem.log

It seems that only ../ and %2E%2E/ were filtered out. If you
hex encode the backslash or use a forward slash you can then
traverse out of the web directory. For example I am able to
grab the server log file with the above request.



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00046-08252004



Solution:
I contacted the developers but never received a response.



Credits:
James Bercegay of the GulfTech Security Research Team




  By Date           By Thread  

Current thread:
  • Keene Digital Media Server Directory Traversal GulfTech Security (Aug 26)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]