lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3543A133C09BAA4B80AA16D2FDEF9F7399BC2A@caonmastxm06.na.capgemini.com>
From: michael.horseman at capgemini.com (Horseman, Michael  W.)
Subject: Novell WebAcces


I think maybe you're seeing the directory traversal vulnerability
identified in Groupwise.  Groupwise 6 had this vulnerability as well as
previous versions if I remember right.

http://xforce.iss.net/xforce/xfdb/7287



Thanks,

Michael Horseman

IT Security Analyst

Capgemini

michael.horseman@...gemini.com <mailto:michael.horseman@...gemini.com>

w: 816.414.4925



"Any sufficiently advanced technology is indistinguishable from magic."
- Arthur C. Clarke

________________________________

From: full-disclosure-bounces@...ts.netsys.com
[mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf Of noAcces
Sent: Friday, January 07, 2005 3:42 AM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Novell WebAcces





I was playing around when I found a small problem with Novell's
WebAcces.
With User.lang you can give in you're language as parameter I tried some
different stuff there and when I tried "> so that the URL would be
hxxp://www.notsohappyserver.com/servlet/webacc?User.Lang="> a Link
apeared I clicked it and so I found some unprotected dirs.
The problem is that the file
hxxps://www.notsohappyserver/com/novell/webaccess/WebAccessUninstall.ini
contains info about the servername context and install paths
It seems that this is working on almost every webacces server.



Kerst actie bij Lycos Mail: 50% korting op Lycos Xtra en Max!
<http://mail.lycos.nl/?TARGETCODE=NL_email_footer_xmas>



This message contains information that may be privileged or confidential and is the property of the Capgemini Group. It is intended only for the person to whom it is addressed. If you are not the intended recipient,  you are not authorized to read, print, retain, copy, disseminate,  distribute, or use this message or any part thereof. If you receive this  message in error, please notify the sender immediately and delete all  copies of this message.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050107/58aa843c/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ