lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 12 Feb 2004 18:31:44 -0600 From: "Alun Jones" <alun@...is.com> To: "'Peter J. Holzer'" <hjp@....ac.at>, <bugtraq@...urityfocus.com> Subject: RE: Apache Http Server Reveals Script Source Code to Remote Users And Any Users Can Access The Forbidden Directory ("/WEB-INF/") > -----Original Message----- > From: Peter J. Holzer [mailto:hjp@....ac.at] > Sent: Wednesday, February 11, 2004 6:50 AM > > Right. On Unix "WEB-INF" and "WEB-INF.." are two different, legal file > names. On Windows, trailing dots seem to be ignored, so "WEB-INF" and > "WEB-INF.." are just two names for the same file. This also > works if the > filename already has an extension, so for example "foo.html" and > "foo.html....." are the same file, too. I wonder whether that can be > exploited, too: Get the contents of a CGI script by requesting > "foo.cgi."? It's been done before - certainly in IIS, there was a bug where getting a "filename.asp." URL gave you the source of the ASP script. Same for "filename.asp:$DATA". Alun. ~~~~ -- Texas Imperial Software | Find us at http://www.wftpd.com or email 1602 Harvest Moon Place | alun@...is.com. Cedar Park TX 78613-1419 | WFTPD, WFTPD Pro are Windows FTP servers. Fax/Voice +1(512)258-9858 | Try our NEW client software, WFTPD Explorer.
Powered by blists - more mailing lists