[23725] in bugtraq

home help back first fref pref prev next nref lref last post

AOLserver 3.4.2 Unauthorized File Disclosure Vulnerability

daemon@ATHENA.MIT.EDU (Tamer Sahin)
Mon Jan 7 03:57:28 2002

Message-ID: <008601c19685$aaa54860$a4c183d9@ts>
Reply-To: "Tamer Sahin" <ts@securityoffice.net>
From: "Tamer Sahin" <ts@securityoffice.net>
To: <bugtraq@securityfocus.com>
Date: Sun, 6 Jan 2002 09:41:19 +0200
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

AOLserver 3.4.2 Unauthorized File Disclosure Vulnerability

Type:
File Disclosure

Release Date:
January 6, 2002

Product / Vendor:
AOLserver is America Online's Open-Source web server. AOLserver is
the backbone of the largest and busiest production environments in
the world. AOLserver is a multithreaded, Tcl-enabled web server used
for large scale, dynamic web sites.

http://www.aolserver.com

Summary:
Due to a flaw in AOLserver 3.4.2 for Windows, it is possible for a
user to gain read access of known password protected files residing
on a AOLserver host.

http://host/passwordprotected.file.

Example:
http://host/nstelemetry.adp.

Tested:
Windows 2000 / AOLserver 3.4.2

Vulnerable:
AOLserver 3.4.2 for Windows
(Unix versions not affect this vulnerability)

Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.

Author:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPDfjf7uLpFMrXtywEQL3QACgkT+oH00dMocnlzJpgcIaYEriu2gAn00J
DrQ7ELKtOtuOq6S2ewcMsF/L
=+6b0
-----END PGP SIGNATURE-----





home help back first fref pref prev next nref lref last post