exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

labs17.html

labs17.html
Posted Feb 9, 2000

USSR Advisory #17 - Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability. UssrLabs found a Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability Using the string '../' in a URL, an attacker can gain read access to any file outside of the intended web-published filesystem directory.

tags | web
SHA-256 | 2247efb7567305f9b3f50ddf74814db5596118e77f0cbe037ea0fc1541e52c52

labs17.html

Change Mirror Download
<html>
<head>
<title>u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>
<!--#exec cgi="/cgi-bin/hitslogger.cgi"-->
<body bgcolor="#FFFFFF" text="#000000" link="#486090" vlink="#485888" alink="#405888">
<table border="0" width="96%" cellspacing="20" cellpadding="20" height="610">
<tr>
<td height="712">
<center>
<table border="0" cellspacing="2" cellpadding="2" width="100%">
<tr>
<td colspan="2" align="LEFT" valign="MIDDLE" bgcolor="#309880"><font face="Verdana" size="-1" color="#FFFFFF">
<font size="+1"><a name="org"></a>Symantec Mail-Gear 1.0 Web interface
Server Directory Traversal Vulnerability</font></font></td>
</tr>
<tr>
<td width="29%" align="LEFT" valign="TOP">&nbsp;</td>
<td width="71%" align="LEFT" valign="TOP">&nbsp;</td>
</tr>
<tr>
<th width="29%" align="LEFT" valign="TOP" height="39">
<p><font face="Verdana" size="-1"> Symantec Mail-Gear 1.0 Web interface</font></p>
</th>
<td width="71%" align="LEFT" valign="TOP" height="39"><font face="Verdana" size="-1">
</font><font face="Verdana" size="-1"> Mail-Gear 1.0</font></td>
</tr>
<tr>
<th width="29%" align="LEFT" valign="TOP" height="661">
<p>&nbsp;</p>
</th>
<td width="71%" align="LEFT" valign="TOP" height="661">
<p><b>PROBLEM</b></p>
<p> UssrLabs found a Symantec Mail-Gear 1.0 Web interface Server
Directory Traversal Vulnerability </p>
<p>Using the string '../' in a URL, an attacker can gain read access
to any file outside of the intended web-published filesystem directory
</p>
<p>There is not much to expand on this one.... </p>
<p><b>Example: </b></p>
<p>http://ServerIp:8003/Display?what=../../../../../autoexec.bat
to show autoexec.bat </p>
<p><b>Vendor Status:</b></p>
<p> Contacted </p>
<p>Vendor Url: http://www.symantec.com/urlabs/public/index.html
</p>
<p><b>Program Url: </b>http://www.symantec.com/urlabs/public/download/download.html</p>
<p> Credit: USSRLABS </p>
<p><b>SOLUTION:</b></p>
<p> Upgrade to Symantec Mail-Gear 1.1 </p>
<p>u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a
r c h </p>
<p align="left">&nbsp;</p>
</td>
</tr>
</table>
<p>&nbsp;</p>
</center>
</td>
</tr>
</table>
</body>
</html>
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close