[18994] in bugtraq
Vulnerability in SEDUM HTTP Server
daemon@ATHENA.MIT.EDU (joetesta@HUSHMAIL.COM)
Sun Feb 4 23:24:23 2001
Content-Type: multipart/mixed;
boundary="Hushpart_boundary_xSObTNIxtYgOcyfmYJSHxCWLFBKzgJjx"
Mime-Version: 1.0
Message-Id: <200102041640.IAA21137@user7.hushmail.com>
Date: Sun, 4 Feb 2001 11:43:07 -0800
Reply-To: joetesta@HUSHMAIL.COM
From: joetesta@HUSHMAIL.COM
To: BUGTRAQ@SECURITYFOCUS.COM
--Hushpart_boundary_xSObTNIxtYgOcyfmYJSHxCWLFBKzgJjx
Content-type: text/plain
Vulnerability in SEDUM HTTP Server
Overview
SEDUM HTTP Server v2.0 is a web server available from
http://www.frassetto.it and http://www.zdnet.com. A vulnerability exists
which allows a remote user to break out of the web root using relative
paths (ie: '..', '...').
Details
http://localhost/../[file outside web root]
http://localhost/.../[file outside web root]
Solution
No quick fix is possible.
Vendor Status
The author, Guido Frassetto, was contacted via <guido@frassetto.it>
and <guidof@tin.it> on Sunday, January 28, 2001 regarding version 1.1 of
SEDUM. He replied promptly and stated that version 2.0 is immune to this
problem. I downloaded the new version, ran more tests, and found that
absolutely nothing is different. Since then, I have not heard back from
Guido Frassetto.
- Joe Testa ( joetesta@hushmail.com )
--Hushpart_boundary_xSObTNIxtYgOcyfmYJSHxCWLFBKzgJjx--
IMPORTANT NOTICE: If you are not using HushMail, this message could have been read easily by the many people who have access to your open personal email messages.
Get your FREE, totally secure email address at http://www.hushmail.com.