lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: webmaster at securiteinfo.com (scrap) Subject: myServer 0.4.3 Directory Traversal Vulnerability myServer 0.4.3 Directory Traversal Vulnerability .oO Overview Oo. myServer version 0.4.3 shows files and directories that reside outside the normal web root directory. Discovered on 2003, August, 23th Vendor: Myserver (http://myserverweb.sourceforge.net/forum/portal.php) MyServer is a free, powerful web server program designed to be easily run on a personal computer by the average computer user. It is a multithread application and supports HTTP, CGI, ISAPI, WinCGI and FastCGI protocols. It is available on Windows and Linux Operating Systems. This web server can shows file and directory content that reside outside the normal web root directory. Original text is at http://www.securiteinfo.com/attaques/hacking/myServer0_4_3.shtml .oO Details Oo. The vulnerability can be done using any browser. You just have to send a specially crafted dot-dot URL to retreive any file outside of the root directory. .oO Exploit Oo. You have to create a dot-dot URL with the same number of "/./" and "/../" + 1. For example, you can use : /././.. /./././../.. /././././../../.. /./././././../../../.. etc... .oO Solution Oo. The vendor has been informed and has solved the problem. Download MyServer 0.5 at http://sourceforge.net/project/showfiles.php?group_id=63119 .oO Discovered by Oo. Arnaud Jacques aka scrap webmaster@...uriteinfo.com http://www.securiteinfo.com
Powered by blists - more mailing lists