Bugtraq mailing list archives

[SecurityOffice] Liteserve Web Server v2.0 Authorization Bypass Vulnerability


From: Tamer Sahin <ts () securityoffice net>
Date: Thu, 24 Oct 2002 21:48:00 +0300

-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

- --[ Liteserve Web Server v2.0 Authorization Bypass Vulnerability ]--

- --[ Type

File Disclosure

- --[ Release Date

October 24, 2002

- --[ Product / Vendor

LiteServe is a powerful, full-featured Web, EMail and FTP server.  This server software
is perfect for personal websites or commercial sites with high traffic demands and
multiple domains. All the services that you need work together efficiently in one
program to provide you with a feature-packed server solution that is easy to setup,
manage, and monitor.

http://www.cmfperception.com

- --[ Summary

It is possible to construct a web request which is capable of accessing the contents
of password protected files/folders on the Liteserve Web Server v2.0. This
vulnerability may only be exploited to access password-protected files in sub-folders
of wwwroot.

http://host/./secret/

- --[ Tested

Windows 2000 Sp3 / Liteserve Web Server v2.0
Windows 98 SE / Liteserve Web Server v2.0

- --[ Vulnerable

Liteserve Web Server v2.0

- --[ Disclaimer

http://www.securityoffice.net is not responsible for the misuse or illegal use of any
of the information and/or the software listed on this security advisory.

- --[ Author

Tamer Sahin
ts () securityoffice net
http://www.securityoffice.net

All our advisories can be viewed at http://www.securityoffice.net/articles/

Please send suggestions, updates, and comments to feedback () securityoffice net

(c) 2002 SecurityOffice

This Security Advisory may be reproduced and distributed, provided that this Security
Advisory is not modified in any way and is attributed to SecurityOffice and provided
that such reproduction and distribution is performed for non-commercial purposes.

Tamer Sahin
http://www.securityoffice.net

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQEVAwUAPbhAYvpL5ibJRTtBAQEl2Qf+ODuwgSXTtG5AXbbTWXIv+OsheElLOdjS
KPLg1GAbubxg0Seh9SEjenzNcuW5lnWHESEFObh+2x/xt1WkV11CuLMGzJPuq3ui
IY1+Ig5M7POQ9HEgML16qocsmKGqPGSevH5NmvqBOQfQZyfMuKLs2X3DbAs02ZK2
h7AwOjbh3EOCCA1oiostkm72p0xhAkLFk94AHSSYCGE8Q9YI2Ii0KMyU+w4DUfV1
bOWlt57X5qh+d41106mj25wmC0k8aKosrABLrba97StD4pLot5DgUZMchoKPHu7J
UXTMqksISFZTe3AVAEJYw2CInG0gOsxqEc5BRQfKQS8u16ldP0dvPQ==
=r8wV
-----END PGP SIGNATURE-----




Current thread: