Multiple Vulnerabilities in NetWin's SurgeLDAP

Four new vulnerabilities have been discovered in NetWin’s SurgeLDAP, the most serious of which could result in a Denial of Service (DoS) condition.

Ken Pfeil

August 16, 2003

2 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported August 13, 2003, by Ziv Kamir.

 

 

VERSIONS AFFECTED

 

  • NetWin SurgeLDAP

 

 

DESCRIPTION

 

Four new vulnerabilities have been discovered in NetWin’s SurgeLDAP, the most serious of which could result in a Denial of Service (DoS) condition. These four new vulnerabilities are:

 

  • Path disclosure of the SurgeLDAP installation directory

  • Cross Site Scripting

  • DoS condition

  • Clear-text password storage

 

Path disclosure:
By requesting a file that doesn't exist on the server (e.g., http://127.0.0.1:6680/aaa.html) someone could cause the server to return the path under which the product is installed.

Cross Site Scripting:
At least one of the parameters that SurgeLDAP's Common Gateway Intefaces (CGIs) parse lets remote attackers insert malicious HTML or JavaScript code into pages.

 

DoS vulnerability:
A remote user can issue an HTTP GET request for a large number of characters (e.g., '/AAAAA[501 times]'), causing the server crash.

Clear Text Password Storage Vulnerability:
SurgeLDAP stores usernames and passwords in clear text in the C:surgeldapuser.dat file.


VENDOR RESPONSE

 

NetWin recommends upgrading to the latest release of SurgeLDAP, which is available on the company's Web site.

 

CREDIT                                                                                                       

 

Discovered byZive Kamir.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like