[22276] in bugtraq

home help back first fref pref prev next nref lref last post

MS-DOS Filename/Directory Vulnerability

daemon@ATHENA.MIT.EDU (Felipe Moniz)
Thu Aug 16 19:23:53 2001

Message-ID: <005401c126c1$b0e92ea0$b139f4c8@pp>
From: "Felipe Moniz" <fmoniz@ig.com.br>
To: <bugtraq@securityfocus.com>
Date: Thu, 16 Aug 2001 19:08:16 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: 8bit

Hi all,

I tested this in the PWS (based on IIS 4) and it worked.

I created a file called "clientlist2001.txt" and with client~1.txt
(www.site.com/client~1.txt) I get the clientlist2001.txt without know the
complete name of the file. The problem occurs also when I type
"postin~1.htm" for access "postinfo.html" file.

I think that it's simple but can open a range of new types of cgi attacks,
depending of the web server. And can be used to change attack
signatures and evade intrusion detection.

PWS is vulnerable, IIS 4.0 and Sambar Server apparently no, but certainly
other win32 web servers are vulnerable. All long filenames, directories and
files with long extensions are vulnerable.

This can be considered a simple data exposure? I think that yes. This access
type can be dangerous, like some directory listening bugs or path
disclosure.

Sorry for my english,

Regards,

Felipe Moniz
Network Security Specialist
felipemoniz@yahoo.com
Especialista em Segurança de Redes
Rio de Janeiro, RJ - Brasil

Know about Brazil:
http://www.hideaway.net/stealth/brasil.shtml



home help back first fref pref prev next nref lref last post