Secunia Security Advisory - Greg Linares has discovered some vulnerabilities in Easy File Sharing Web Server, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to disclose sensitive information.
c6e2c16cfa4a83180b50f49bc2a4d9cb918c90863de86047c096a0f9871232f7
----------------------------------------------------------------------
To improve our services to our customers, we have made a number of
additions to the Secunia Advisories and have started translating the
advisories to German.
The improvements will help our customers to get a better
understanding of how we reached our conclusions, how it was rated,
our thoughts on exploitation, attack vectors, and scenarios.
This includes:
* Reason for rating
* Extended description
* Extended solution
* Exploit code or links to exploit code
* Deep links
Read the full description:
http://corporate.secunia.com/products/48/?r=l
Contact Secunia Sales for more information:
http://corporate.secunia.com/how_to_buy/15/?r=l
----------------------------------------------------------------------
TITLE:
Easy File Sharing Web Server Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA22602
VERIFY ADVISORY:
http://secunia.com/advisories/22602/
CRITICAL:
Moderately critical
IMPACT:
Cross Site Scripting, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
Easy File Sharing Web Server 4.x
http://secunia.com/product/12461/
DESCRIPTION:
Greg Linares has discovered some vulnerabilities in Easy File Sharing
Web Server, which can be exploited by malicious users to conduct
script insertion attacks and by malicious people to disclose
sensitive information.
1) Input passed to the "author", "content", and "title" parameters
when posting a new forum thread is not properly sanitised before
being used. This can be exploited to execute arbitrary HTML and
script code in a user's browser session when malicious data is
viewed.
2) An error exists within the handling of alternative data streams.
When running on a NTFS file system, this can be exploited to disclose
the content of arbitrary files in the web root by appending "::$DATA"
to the request. This allows to gain knowledge of user and
administrator login credentials, cryptographic keys and certificates,
private messages, logfiles, and other sensitive information.
The vulnerabilities are confirmed in version 4.0. Other versions may
also be affected.
SOLUTION:
Greg Linares
PROVIDED AND/OR DISCOVERED BY:
Grant access to trusted users only. Use in trusted network
environments only.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------