exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netscape-wp.dir-list

netscape-wp.dir-list
Posted Mar 24, 2000
Authored by Fobic | Site zsh.stupidphat.com

ZSH Advisory - Netscape WebPublisher Allows Directory Listing and Access. Netscape Webpublisher is an addon to Netscape's Enterprise webserver which allows remote file modifications, uploads and downloads. A third party user can access the WebPublisher via downloading a number of java applets and the webserver's directory structure without having a valid account on the system. Netscape v3.5.1 / 3.6 SP1-3 under solaris are vulnerable.

tags | exploit, java, remote
systems | solaris
SHA-256 | fe012892a4ac1f20d6bb25a0c0a171ed2caeab44aa5c8dc575e5b034b62084e2

netscape-wp.dir-list

Change Mirror Download


----------------

[ ZSH ] Advisory


Netscape WebPublisher Allows Directory Listing and Access

[ March 11, 2000 ] [ AD#000311-1 ]

----------------



Brief Description :

Netscape Webpublisher is an addon to Netscape's Enterprise webserver which allows remote
filemodifications, uploads and downloads. A third party user can access the WebPublisher via
downloading a number of java applets and the webserver's directory structure without
having a valid account on the system.


Vulnerable Platforms :

Solaris


Vulnerable Versions :

Netscape-Enterprise/3.5.1C
Netscape-Enterprise/3.5.1G
Netscape-Enterprise/3.5 1I
Netscape-Enterprise/3.6 SP1
Netscape-Enterprise/3.6 SP2
Netscape-Enterprise/3.6 SP3


Vulnerability Description :

Netscape's WebPublisher software, is an addon to Netscape-Enterprise servers, which
allows file uploads and downloads, deleting and changing permissions on files. The
WebPublisher installs by default in the /publisher directory on the webserver. This file is
accessible for any third party user who can then install a local copy of the webpublisher or
either run the remote version and gain access to the system.


By doing a GET on /publisher we get a page that is titled "WebPublisher Home Page" and
that contains some information about webpublisher. On the page there is also a Start
Webpublisher button, which when pressed will download the WebPublisher Java Applet set.
The default size for this download is 677k. It will then autostart the Java Applets and ask you
to grant three electronic certificates ( developed by VeriSign ). When granted the server will
query you for a username. You can input any username in here that you want. It doesn't need
to be a valid system username. The applet will continue and open the WebPublisher window
itself which will prompt you a directory listing of the webserver along with a menu at the top.


This access violation lets you see the virtual directory root of the webserver. The menubar
at the top lets you upload and download files and directories, modify files, delete and move
them. These requests do ask for a password which can be brute forced. Nonetheless,
WebPublisher is not supposed to allow directory listing and access (to open directories) to
third party unauthorized users.


Solution :

#1 Uninstall Webpublisher or set directory permissions on the /publisher directory.
#2 Apply Access Control to WebPublisher through the access control module.


by f0bic (f0bic@deadprotocol.org)



[ Full Advisory : http://zsh.stupidphat.com/advisory.cgi?000311-1 ]



----------------

-- [ http://zsh.stupidphat.com ] --



Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close