Multiple Vulnerabilities in Minihttp's Forum Web Server

Three vulnerabilities exist in Minihttp’s Forum Web Server version 1.60.

Ken Pfeil

March 10, 2003

2 Min Read
ITPro Today logo

ReportedMarch 9, 2003, by Dennis Rand.

 

 

VERSIONS AFFECTED

 

  • Minihttp’s Forum Web Server version 1.60

 

DESCRIPTION

 

Threevulnerabilities exist in Minihttp’s Forum WebServer version 1.60. The first allows a potential attacker to accessfiles that reside outside the restricted area of the server. The second allowsthe insert of malicious HTML and JavaScript into existing web pages (Cross SiteScripting). The third makes it possible to steal the username and password ofother users.

 

 

DEMONSTRATION

 

The discover posted the following scenarios as proof of concept:

 

DirectoryTraversal:
Within the FileSharing area, press the "Upload new file" button, nowin the upload field write:

c$winntrepairsam._

This will now be "uploaded" to the area where you selected.

XSS:
When posting or replying to a message in the "Message Forum" it ispossible to exploit an XSS vulnerability. The vulnerability exists in both inthe Subject and Message property.

Example:
Insert this into either Subject or Message property:
< script>alert('I OwN You');
< img%20src=javascript:alert(document.domain)>
< script>alert(document.cookie)
< script>window.open('http://www.infowarfare.dk')

Information leak:
Using the Traversal vulnerability it is possible to get the whole username andpassword file used by the Forum Web Server. This is done by simply supplying thefollowing "upload file": \c$program Fileswebforums serveruser.ini. The usernames and passwords themselves are stored inclear text.

 

VENDOR RESPONSE

 

The vendor, Minhttphas released a version 1.61, which not vulnerable to this condition.

 

CREDIT          

Discoveredby Dennis Rand.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like