what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Netscape.Publisher.ACL.txt

Netscape.Publisher.ACL.txt
Posted Feb 12, 2001
Site netscape.com

Netscape Enterprise Server 3.5.1 (Publisher) has a problem with the default ACL settings that could allow an intruder to view/download "non-public" files in the web root.

tags | exploit, web, root
SHA-256 | 7a62731a05028e001f32f9d4c8e75d4140a036bb3958b1acba24163c1b5f6704

Netscape.Publisher.ACL.txt

Change Mirror Download
Vendor: Netscape
Product: Enterprise Server 3.5.1 (and others?)
Specifics: Netscape Web Publisher

Vulnerability Briefing: A very wide problem with ACL
settings and default
settings with Netscape Enterprise Server (Publisher).

Description:
With the default installation of Netscape Enterprise Server
3.5.1 (and
others possibly), a java based package called the "Netscape
Web Publisher"
is included. This program is web based and is also linked on
the default
index which comes with Enterprise Server.

After running an extensive search of the default index
content, I have
found various sites running Publisher, with a poor
application
of the ACL (Access Control Lists) options of Enterprise
Server (about 90%
of the sites).

Such actions that an intruder could apply would be the
search of web index
content, web root directory listing, and the
viewing/downloading of
"non-public" files in the web root.

Here are descriptors which provides a criteria of what
should be
considered vulnerable:

-The default Enterprise Server index is public
-http://www.poorperms.null/publisher is publicly available
-Proper and more secure ACL selections

The third descriptor is one quite important. With Enterprise
Server, I
believe that you have the option of picking USER/PASS
authentication vs.
certificate based authentication. Many of these sites pick
the later,
certificate authentication. An intruder could simply use a
proxy and/or
use other cloaking techniques, accept the certificate, and
continue on to
use the Publisher.

*Solution*
The solution(s) is one that is parted, where both Netscape
and the
customer/administrator could take part to provide solutions
to this on
going problem.

Fixes:
-Remove the default index and any default programs you do
not use (such as
Publisher, and Publisher Search)
-If Publisher must be used, USER/PASS methods are highly
recommended
rather than certificates
-Use the ACL settings more efficiently (directory perms,
etc.)

For more information on how to take control of ACL options,
refer to the
help directory which comes with Enterprise Server, or visit
the vendor's
website at http://www.netscape.com.


Adios,
Charles Chear
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close