lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <128182013962.20021024215033@securityoffice.net>
From: ts at securityoffice.net (Tamer Sahin)
Subject: [SecurityOffice] BRS WebWeaver Web Server v1.01 Protected File Access Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

- --[ BRS WebWeaver Web Server v1.01 Protected File Access Vulnerability ]--

- --[ Type

File Disclosure

- --[ Release Date

October 24, 2002

- --[ Product / Vendor

BRS WebWeaver is a small, fast HTTP and FTP Server for Win9x/WinNT. I've done a
little testing and it is able to sustain over 750 connection per second using only 4MB
of memory

Web Server with the following features:

- - HTTP/1.0 compliant Web Server
- - Built in FTP Server
- - Basic ISAPI support (Microsoft Internet Server API)
- - CGI/1.1 support
- - Multi-threaded
- - Basic user authentication
- - IP address based security
- - URL based security (Realms)
- - Alias support
- - SSI Support (Server Side Includes)
- - Remote Administration (Partially Implemented)
- - FREE!

http://www.bsoutham.org

- --[ Summary

It is possible to construct a web request which is capable of accessing the contents
of password protected files/folders on the BRS WebWeaver Web Server v1.01. This
vulnerability may only be exploited to access password-protected files in sub-folders
of wwwroot.

http://host/./secret/

- --[ Tested

Windows 2000 Sp3 / BRS WebWeaver Web Server v1.01
Windows 98 SE / BRS WebWeaver Web Server v1.01

- --[ Vulnerable

BRS WebWeaver Web Server v1.01

- --[ Disclaimer

http://www.securityoffice.net is not responsible for the misuse or illegal use of
any of the information and/or the software listed on this security advisory.

- --[ Author

Tamer Sahin
ts@...urityoffice.net
http://www.securityoffice.net

All our advisories can be viewed at http://www.securityoffice.net/articles/

Please send suggestions, updates, and comments to feedback@...urityoffice.net

(c) 2002 SecurityOffice

This Security Advisory may be reproduced and distributed, provided that this Security
Advisory is not modified in any way and is attributed to SecurityOffice and provided
that such reproduction and distribution is performed for non-commercial purposes.

Tamer Sahin
http://www.securityoffice.net

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQEVAwUAPbhA+/pL5ibJRTtBAQE6tQf/aM9y6aTMVpdS1JXFfvaciE7coVldFpyB
XGw/U9Vqrry9R+wuAhd8Hv/CjUsOpQv73THJYG3cYqXSHTJJRZbRqkBMtLR+aR71
qgnE/9X18xFPjC2oK1LJu94SNq1SxI3v8WA/eNdqvAAHZo1HhgCOflRyAcqDZkAr
qap/eosQadS6Y0SU63MyrV+Tq3+aDgZrxhEHS28dSLK+h0hmCWHbo/We4M0DaaXV
ZqhUe1R2ulS/6zAqutwtLTYRJXhOpHs65iDpCmxyo21fvUwgvCfUT6qKbf3pqa47
qq72ORCFBKgCWw+ZogZQ4p+kAtPoZjhutPTQy5t+ML1aGrq20eMo4A==
=8+f1
-----END PGP SIGNATURE-----




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ