Bugtraq mailing list archives
Abyss Webserver 1.0 Administration password file retrieval exploit
From: "Jeremy Roberts" <macaddy () msn com>
Date: Tue, 09 Apr 2002 16:20:33 -0400
Abyss Web Server was just released April 3rd . The Web Server is vulnerable to retrieving the password file on the host's computer. An attacker can send a request to get the password file just by breaking WWWROOT using Unicode.
heres a report i wrote NETCRA$H SECURITY REPORT Abyss Web Server 1.0 Download password file to gain admin access Author: Sitedude ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: April 7, 2002 Class: Bad Programming Vulnerable to Unicode fault Remote/Local: Local & Remote Vulnerable: Abyss Webserver 1.0 . Unaffected: N/A Vulnerable Systems: Windows 95 Windows 98 (All Builds) Windows NT (All Builds) Windows 2000 (All Builds) Windows XP (All Builds) Abstract: Abyss Web Server was just released April 3rd . TheWeb Server is vulnerable to retrieving the password file on the host's computer. An attacker can send
a request to get the password file just by breaking WWWROOT using Unicode. Exploit: http://127.0.0.1/cgi-bin/%2e%2e/abyss.conf Workaround: Download the patch below Vendor Status: The vendor has been contacted and provided a fix. Product Fix: We emailed the company and they have provided a fix Abyss Webserver Unicode fix ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~We at NetCrash Studios e-mailed the company and they did manage to fix the problem and provide us with the patch
were hosting the patch on our site http://www26.brinkster.com/netcrash/abyssws.zip This is the reply from Aprelium Technologies -----------------------------------------------------------------------First of all, thank you for your interest in Abyss Web Server and thank youfor the bug report you sent.
The bug was confirmed and it has been fixed. You'll find a patched abyssws executable attached to this mail. Please uncompress it and replace the original one with it. If you have other questions or remarks, please do not heistate to contact us. Best regrads, Moez Mahfoudh CTO & Co-founder Aprelium Technologies http://www.aprelium.com ------------------------------------------------------------------------ Thanks for taking your time to read this. Jeremy NetCrash Studios http://www26.brinkster.com/netcrash _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.
Current thread:
- Abyss Webserver 1.0 Administration password file retrieval exploit Jeremy Roberts (Apr 09)