[23847] in bugtraq

home help back first fref pref prev next nref lref last post

Web Server 4D/eCommerce 3.5.3 Directory Traversal Vulnerability

daemon@ATHENA.MIT.EDU (Tamer Sahin)
Mon Jan 14 20:04:34 2002

Message-ID: <004b01c19d4b$e7ac95c0$96c283d9@ts>
Reply-To: "Tamer Sahin" <ts@securityoffice.net>
From: "Tamer Sahin" <ts@securityoffice.net>
To: <bugtraq@securityfocus.com>
Date: Tue, 15 Jan 2002 00:36:26 +0200
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Web Server 4D/eCommerce 3.5.3 Directory Traversal Vulnerability

Type:
Directory Traversal

Release Date:
December 15, 2002

Product / Vendor:
Web Server 4D/eCommerce is a single application that includes a
shopping cart, credit card authorization, and order tracking.

http://www.mdg.com

Summary:
A vulnerability exists in WS4D/eCommerce which could allow an
unauthorized user to gain access to a known file residing on the
target host. 

This is achievable if a specially crafted URL composed of double dot
"../" directory traversal sequences, with Unicode character
representations substituted for "/" and "\" , is submitted to a host.

Example:
http://host/%2f..%2f..%2f../ws4d.log.txt

And view webserver log file.

Tested:
Windows 2000 / Web Server 4D/eCommerce 3.5.3

Vulnerable:
Web Server 4D/eCommerce 3.5.3 (And may be other)

Disclaimer:
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.

Authors:
Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

Tamer Sahin
http://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQA/AwUBPENdabuLpFMrXtywEQLOCgCg/fKnofIyIbi7KqlTnRoMUVXgcD0AoLaQ
osdsCpw+VjAmliVWZveqtScr
=V6Of
-----END PGP SIGNATURE-----





home help back first fref pref prev next nref lref last post