what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SLA-17.Anaconda.txt

SLA-17.Anaconda.txt
Posted Oct 15, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-17 - A flaw in Linux/UNIX Anaconda Foundation Directory, a yahoo style search engine based on the Open Directory Project allows remote users to traverse the webservers filesystem, allowing arbitary files to be read by appending a trailing NULL byte in URL encoded format. Exploit URL included.

tags | exploit, remote
systems | linux, unix
SHA-256 | 114471e6a48ade395cf5dd9910cfbb9ebc5b97960e372c164656001a5ddd2840

SLA-17.Anaconda.txt

Change Mirror Download
        Synnergy Laboratories Advisory SLA-2000-17

NAME

Anaconda Foundation Directory NULL byte vulnerability

AFFECTED

Linux/UNIX with Anaconda Foundation Directory

SYNOPSIS

Synnergy Labs has found a flaw within Anaconda Foundation Directory that allow
s a user to
successfully traverse the filesystem on a remote host, allowing arbitary files
/folders to
be read.


DESCRIPTION

The Anaconda Foundation Directory is a Yahoo style search engine based on the
Open Directory
project, www.dmoz.org. The Anaconda Foundation Directory allows you to dynamic
ally integrate content into
your site's own look and feel. This is the exact same content that Lycos featu
res on their
front page! Product pricing is $499 US.

Anaconda Foundation Directory can be found at:http://anacondapartners.com/ap_a
fodpdemo.shtml

Synnergy has recently discovered a flaw within Anaconda Foundation Directory t
hat allows a remote
user to traverse the filesystem as a request to the script using the $template
=_some_file_. It is
then possible to read any file contents with priviledges as the httpd.
Although the script checks for the file extension (.htm, .html, .shtml, .stm)
adding a trailing
%00.html, (a NULL byte in URL encoded format), at the end of the request will
force the script to
open the file.

Example:

http://www.target.com/cgi-bin/apexec.pl?etype=odp&template=../../../../../../.
./../../etc/resolv.conf%00.html&passurl=/category/


The above line if given will output the file contents of /etc/resolv.conf.

SOLUTION

The vendors have been informed of the bug. It is advised to wait for the next
patched version of
Anaconda Foundation Directory to be released.


AUTHOR

Discovery: pestilence @ synnergy.net


DISCLAIMER

Synnergy Laboratories may not be held liable for the use or potential
effects of these programs or advisories, nor the content contained
within. Use them at your own risk.

COPYRIGHT

Synnergy Laboratories - www.synnergy.net (c) 1998-2000

Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close