uhttp Server 0.1.0-alpha Path Traversal Vulnerability

2010.03.24
Credit: Drosophila
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

uhttp Server Path Traversal Vulnerability Name uhttp Server Vendor http://uhttps.sourceforge.net Versions Affected 0.1.0-alpha Author Salvatore Fresta aka Drosophila Website http://www.salvatorefresta.net Contact salvatorefresta [at] gmail [dot] com Date 2010-03-10 X. INDEX I. ABOUT THE APPLICATION II. DESCRIPTION III. ANALYSIS IV. SAMPLE CODE V. FIX VI. DISCLOSURE TIMELINE I. ABOUT THE APPLICATION An ultra lightweight webserver with a very small memory usage. II. DESCRIPTION Bad chars are not properly sanitised. III. ANALYSIS Summary: A) Path Traversal A) Path Traversal The problem is in the management of the bad chars that can be used to launch some attacks, such as the directory traversal. The path traversal sequence ('../') is not checked, so it can be used for seeking the directories of the affected system. IV. SAMPLE CODE The following is a simple example: GET /../../../../../../etc/passwd HTTP/1.1 In this example, the daemon has been started in the follows path: /home/drosophila/downloads/uhttps/src V. FIX No patch. VIII. DISCLOSURE TIMELINE 2010-03-10 Bug discovered 2009-03-10 Advisory Release


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top