MegaBrowser < 0.71b Multiple Vulnerabilities

2018.01.05
Credit: GulfTech
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

MegaBrowser Multiple Vulnerabilities Vendor: Quality Programming Corporation Product: MegaBrowser Version: <= 0.71b Website: http://www.megabrowser.com BID: 7802 7803 Description: Megabrowser is a free standalone program that enables you to host websites and FTP sites by utilizing its powerful advanced peer-to-peer features. You can now host websites and FTP sites without paying any hosting fees. Simply store your sites in the directories of your choice on your laptop or personal computer. Directory Traversal Vulnerability: MegaBrowser HTTP server is vulnerable to a directory traversal vulnerability which allows access to any file on the system as well as directory viewing of the root web directory http://www.someplace.com/../../../../../WINNT/repair/sam http://www.someplace.com/../ FTP User Enumeration Vulnerability: While not as serious as the previously mentioned vuln, this still poses a threat as it may allow an attacker to harvest a list of valid FTP usernames on the system. user blah 530 User can't log in user anonymous 331 Anonymous access allowed, send identity (e-mail name) as password Solution: Vendor contacted, but never replied. No known solution. Credits: James Bercegay of the GulfTech Security Research Team.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top