Bugtraq mailing list archives

Abyss Webserver 1.0 Administration password file retrieval exploit


From: "Jeremy Roberts" <macaddy () msn com>
Date: Tue, 09 Apr 2002 16:20:33 -0400



Abyss Web Server was just released April 3rd . The Web Server is vulnerable to retrieving the password file on the host's computer. An attacker can send a request to get the password file just by breaking WWWROOT using Unicode.

heres a report i wrote
NETCRA$H SECURITY REPORT

Abyss Web Server 1.0 Download password file to gain admin access

Author: Sitedude

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Date: April 7, 2002

Class: Bad Programming Vulnerable to Unicode fault

Remote/Local: Local & Remote

Vulnerable: Abyss Webserver 1.0 .

Unaffected: N/A

Vulnerable Systems: Windows 95

Windows 98 (All Builds)

Windows NT (All Builds)

Windows 2000 (All Builds)

Windows XP (All Builds)



Abstract:

Abyss Web Server was just released April 3rd . The

Web Server is vulnerable to retrieving the password file on the host's computer. An attacker can send

a request to get the password file just by breaking WWWROOT using Unicode.



Exploit:

http://127.0.0.1/cgi-bin/%2e%2e/abyss.conf



Workaround:
Download the patch below



Vendor Status:
The vendor has been contacted and provided a fix.



Product Fix:
We emailed the company and they have provided a fix

Abyss Webserver Unicode fix
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




We at NetCrash Studios e-mailed the company and they did manage to fix the problem and provide us with the patch

were hosting the patch on our site
http://www26.brinkster.com/netcrash/abyssws.zip



This is the reply from Aprelium Technologies

-----------------------------------------------------------------------
First of all, thank you for your interest in Abyss Web Server and thank youfor the bug report you sent.
The bug was confirmed and it has been fixed.
You'll find a patched abyssws executable attached to this mail. Please
uncompress it and replace the original one with it.

If you have other questions or remarks, please do not heistate to contact
us.

Best regrads,

Moez Mahfoudh
CTO & Co-founder
Aprelium Technologies
http://www.aprelium.com
------------------------------------------------------------------------

Thanks for taking your time to read this.
Jeremy
NetCrash Studios http://www26.brinkster.com/netcrash



_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.


Current thread: