uhttp Server Path Traversal Vulnerability
Name uhttp Server
Vendor http://uhttps.sourceforge.net
Versions Affected 0.1.0-alpha
Author Salvatore Fresta aka Drosophila
Website http://www.salvatorefresta.net
Contact salvatorefresta [at] gmail [dot] com
Date 2010-03-10
X. INDEX
I. ABOUT THE APPLICATION
II. DESCRIPTION
III. ANALYSIS
IV. SAMPLE CODE
V. FIX
VI. DISCLOSURE TIMELINE
I. ABOUT THE APPLICATION
An ultra lightweight webserver with a very small memory
usage.
II. DESCRIPTION
Bad chars are not properly sanitised.
III. ANALYSIS
Summary:
A) Path Traversal
A) Path Traversal
The problem is in the management of the bad chars that can
be used to launch some attacks, such as the directory
traversal.
The path traversal sequence ('../') is not checked, so it
can be used for seeking the directories of the affected
system.
IV. SAMPLE CODE
The following is a simple example:
GET /../../../../../../etc/passwd HTTP/1.1
In this example, the daemon has been started in the follows
path: /home/drosophila/downloads/uhttps/src
V. FIX
No patch.
VIII. DISCLOSURE TIMELINE
2010-03-10 Bug discovered
2009-03-10 Advisory Release