what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

minihttp.txt

minihttp.txt
Posted Sep 16, 2003
Authored by Peter Winter-Smith

Minihttpserver 1.x Host Engine is susceptible to a directory traversal attack and has a login parsing flaw that allows a remote attacker to gain administrative privileges.

tags | exploit, remote
SHA-256 | c3811137432dca7f6b3480030b9e97885c8de1ef80de534902b0ea664f882952

minihttp.txt

Change Mirror Download
Minihttpserver 1.x Host Engine Flaws

Url: http://www.minihttpserver.net

+ File-Sharing for NET:

"File Sharing for net is a complete, secure web server that shares your
business documents and files over the web: remote users only need
browsers to view your files. Share, transfer files securely with
colleagues. "

+ Forums Web Server

"WebForums Server allows you to setup a bulletin board and photo/file
exchange web service. It offers a built in HTTP engine, internal
database engine, integrated HTML/Script pages, user management
interface, message board engine and a secure file Upload/Download
option. It is without a doubt the easiest and complet all in one Forum
Server software you have seen."

- Both Vendors Descriptions

Both products, in my opinion, deliver exactly what they offer, and are
definitely a reasonable buy for the price, remembering the fact that
you do not only get the scripts, but a well rounded webserver to boot.

However there is one aspect in which they are seriously lacking -
Security.

In light of Mr Dennis Rand's recent discovery of several dangerous
flaws within the server:

http://www.infowarfare.dk/Advisories/iw-09-advisory.txt

All of which (it is claimed) are fixed, you would have thought that
security would have become quite a priority for the development team,
but it appears this was not the case.

It took me about two minutes to find two more dangerous flaws which
can allow a remote user complete administrator access to the system
file/forum system and any file on the remote server.
These are not difficult, hard to find flaws, and I think even a few
minutes auditing would have turned both of these up immediately.

Flaw 1 - Directory Traversal:
=============================

http://server/../user.ini

This will allow the remote unauthenticated user to break free of the
webroot, and download any file on the system

The example file downloads the username and password file for both
applications, effectively allowing an intruder to access the vulnerable
system from the web based login page without any type of malformed
request.

Flaw 2 - Login Parsing Flaw
===========================

When Web Forum Server is first installed, it is often possible to
gain administrator access to the forum by using the following login
information:

Username: Admin
Password: "

I have managed to also login this way by typing ' admin" ' in the
password recovery box.


======================================================================


Operating system and servicepack level:
Windows 9x/Me/NT Based


Software:
+ Minihttpserver 1.x
+ Web Forum Server 1.x
+ File-Sharing NET 1.x


Under what circumstances the vulnerability was discovered:
By mistake pretty much - Testing some older vulns.


If the vendor has been notified:
Yes, the vendor had been notified.


How to contact you for further information:
I can always be reached at peter4020@hotmail.com


Please credit this find to:
Peter Winter-Smith


Thank you for your time,
-Peter

_________________________________________________________________
Express yourself with cool emoticons - download MSN Messenger today!
http://www.msn.co.uk/messenger

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close