[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

uhttp Server Path Traversal Vulnerability

Author
Salvatore Fresta
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11419
Category
remote exploits
Date add
23-03-2010
Platform
multiple
=========================================
uhttp Server Path Traversal Vulnerability
=========================================


uhttp Server Path Traversal Vulnerability
 
 Name              uhttp Server
 Vendor            http://uhttps.sourceforge.net
 Versions Affected 0.1.0-alpha
 
 Author            Salvatore Fresta aka Drosophila
 Website           http://www.salvatorefresta.net
 Contact           salvatorefresta [at] gmail [dot] com
 Date              2010-03-10
 
X. INDEX
 
 I.    ABOUT THE APPLICATION
 II.   DESCRIPTION
 III.  ANALYSIS
 IV.   SAMPLE CODE
 V.    FIX
 VI.   DISCLOSURE TIMELINE
  
 
I. ABOUT THE APPLICATION
 
An ultra lightweight webserver with  a very  small  memory
usage.
 
 
II. DESCRIPTION
 
Bad chars are not properly sanitised.
 
 
III. ANALYSIS
 
Summary:
 
 A) Path Traversal
 
A) Path Traversal
 
The problem is in the management of the bad chars that can
be  used  to  launch  some attacks,  such as the directory
traversal.
The path traversal sequence ('../') is not checked, so  it
can be used for seeking the  directories  of the  affected
system.
 
 
IV. SAMPLE CODE
 
The following is a simple example:
 
GET /../../../../../../etc/passwd HTTP/1.1
 
In this example, the daemon has been started in the follows
path: /home/drosophila/downloads/uhttps/src
 
 
V. FIX
 
No patch.
 
 
VIII. DISCLOSURE TIMELINE
 
2010-03-10 Bug discovered
2009-03-10 Advisory Release




#  0day.today [2024-06-03]  #