[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1093890513_278296@mail.cableone.net>
Date: Mon, 30 Aug 2004 13:45:47 -0500
From: "GulfTech Security" <security@...ftech.org>
To: <bugtraq@...urityfocus.com>
Subject: Multiple Vulnerabilities In Xedus Webserver
##########################################################
# GulfTech Security Research August, 30th 2004
##########################################################
# Vendor : Jerod Moemeka
# URL : http://www.thinxoft.com
# Version : Xedus 1.0
# Risk : Multiple Vulnerabilities
##########################################################
Description:
Xedus is a Peer-to-Peer web server and provides you with the
ability to share files, music, and any other media, as well
as create robust and dynamic web sites, which can feature
database access, file system access, with full .net support.
Powered by a built in server-side, Microsoft C#, scripting
language; Xedus boasts the ability to create sites that can
rival web applications built on any other enterprise servers
like Apache, IIS, Iplanet. With Xedus, you will never need
to pay to host your sites again. Using the peer-to-peer mode,
other members of LIVE can access you site by keyword using
Internet Explorer even if you do not have a static IP address!
Denial of Service:
Xedus Webserver cannot handle multiple connections from the
same host, and will deny all access to any users after a
number of connections are made from a malicious user. This
vulnerability can be leveraged by an attacker to deny all
requests to a website, thus rendering it inaccessible.
Cross Site Scripting:
Xedus Webserver comes with a number of test scripts. These
test scripts are used to display some of the capabilities of
the Xedus webserver.
http://host:4274/test.x?username=[XSS]
http://host:4274/TestServer.x?username=[XSS]
http://host:4274/testgetrequest.x?param=[XSS]
However, the input received by some of these test scripts are
not properly sanitized. Because the input is not properly
sanitized, it allows for an attacker to send a malicious url
that will then render malicious code in the context of a
victim's web browser. A quick and easy way to resolve these xss
issues is to delete the .x files located in the ./sampledocs
folder of the Xedus Webserver installation.
Directory Traversal Vulnerability:
Xedus webserver does not properly sanitize requests sent to the
server. This vulnerability can be exploited to retrieve arbitrary,
potentially sensitive files from the hosting computer with the
privileges of the web server. This may aid a malicious user in
further attacks.
http://host:4274/../data/log.txt
http://host:4274/../../../../../boot.ini
http://host:4274/../../../../../WINNT/repair/sam
It should be noted, that by default the Xedus Webserver listens
for incoming connections on port 4274, however this value can be
edited by the administrator of the Xedus webserver.
Solution:
I contacted the developers but never received a response. To
resolve the Cross Site Scripting issue, simply remove the sample
.x scripts located in the ./sampledocs directory
Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00047-08302004
Credits:
James Bercegay of the GulfTech Security Research Team
Powered by blists - more mailing lists