[<prev] [next>] [day] [month] [year] [list]
Message-ID: <fc.00802e600021e6b400802e600021e6b4.21e717@rbwm.org>
Date: Tue, 28 Oct 2003 21:54:04 +0000
From: "Richard Maudsley" <maudr001@...m.org>
To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com,
intl_fcsupport@...ntext.com, vuln@...urity.nnov.ru
Subject: FirstClass 7.1 HTTP Server: Remote Directory Listing
FirstClass 7.1 HTTP Server allow the listing of all files under the web
root directory and user web directories. This can be achieved by appending
"/Search" to the URL. The browser will present a file searching form. If
all check boxes (search options) are selected, and the filename text box
is left blank, all files will be shown in the results and can be viewed
through the browser.
This vulnerability can disclose a huge amount of information about the
servers setup which will aid attackers in exploiting further holes in the
server.
Exploits:
http://SERVER/Search
http://SERVER/~Account%20Name/Search
Regards,
Richard Maudsley
- -------------------------------------------------------------------
This email has been sent from the Royal Borough of Windsor and Maidenhead LEA system, if you have cause for complaint regarding the
content of this email please contact abuse@...m.org
- -------------------------------------------------------------------
Powered by blists - more mailing lists