Web Server 4D/eCommerce 3.5.3 Directory Traversal Vulnerability

From: Tamer Sahin (tsat_private)
Date: Mon Jan 14 2002 - 14:36:26 PST

  • Next message: Jouko Pynnonen: "MSIE may download and run programs automatically - details"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Web Server 4D/eCommerce 3.5.3 Directory Traversal Vulnerability
    
    Type:
    Directory Traversal
    
    Release Date:
    December 15, 2002
    
    Product / Vendor:
    Web Server 4D/eCommerce is a single application that includes a
    shopping cart, credit card authorization, and order tracking.
    
    http://www.mdg.com
    
    Summary:
    A vulnerability exists in WS4D/eCommerce which could allow an
    unauthorized user to gain access to a known file residing on the
    target host. 
    
    This is achievable if a specially crafted URL composed of double dot
    "../" directory traversal sequences, with Unicode character
    representations substituted for "/" and "\" , is submitted to a host.
    
    Example:
    http://host/%2f..%2f..%2f../ws4d.log.txt
    
    And view webserver log file.
    
    Tested:
    Windows 2000 / Web Server 4D/eCommerce 3.5.3
    
    Vulnerable:
    Web Server 4D/eCommerce 3.5.3 (And may be other)
    
    Disclaimer:
    http://www.securityoffice.net is not responsible for the misuse or
    illegal use of any of the information and/or the software listed on
    this security advisory.
    
    Authors:
    Tamer Sahin
    tsat_private
    http://www.securityoffice.net
    
    Tamer Sahin
    http://www.securityoffice.net
    PGP Key ID: 0x2B5EDCB0 Fingerprint:
    B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 7.1
    
    iQA/AwUBPENdabuLpFMrXtywEQLOCgCg/fKnofIyIbi7KqlTnRoMUVXgcD0AoLaQ
    osdsCpw+VjAmliVWZveqtScr
    =V6Of
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Jan 14 2002 - 17:04:08 PST