Plugin ID | 182 |
Plugin name | Keene Digital Media Server prior 1.0.2 Directory Traversal |
Plugin filename | Keene Digital Media Server prior 1.0.2 Directory Traversal.plugin |
Plugin filesize | 3331 bytes |
Plugin family | HTTP |
Plugin created name | Nico 'Triplex' Spicher |
Plugin created email | Triplex at IT-Helpnet dot de |
Plugin created web | http://triplex.it-helpnet.de |
Plugin created company | http://www.it-helpnet.de |
Plugin created date | 2004/09/07 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Made some slight modifications in version 1.1. Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 8080 |
Plugin procedure exploit | open|send GET /%2E%2E%5Csystem.log HTTP/1.0\n\n|sleep|close|pattern_exists 200 |
Plugin exploit accuracy | 95 |
Plugin comment | This plugin was written with the ATK-Plugin-Creator [http://triplex.it-helpnet.de]. |
Bug published name | James Bercegay |
Bug published web | http://www.gulftech.org |
Bug published company | GulfTech Security Research Team |
Bug published date | 2004/08/25 |
Bug advisory | http://www.gulftech.org/?node=research&article_id=00046-08252004 |
Bug affected | Keene Digital Media Server 1.0.2 |
Bug not affected | The vendor has stated that the vulnerabilities will be fixed in an upcoming version 1.0.4 |
Bug vulnerability class | Directory Traversal |
Bug description | The directory traversal issue is present upon requesting files outside the webroot of the application using hex encoded directory traversal character sequences to create a relative path to the target file.This vulnerability will allow a remote attacker to retrieve potentially sensitive files, possibly aiding them in further system compromise. |
Bug solution | Upgrade to Keene Digital Media Server to 1.0.4 or newer. Also limit unwanted connections and communications with firewalling if possible. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | No |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 2 |
Bug simplicity | 7 |
Bug impact | 7 |
Bug risk | 4 |
Source Secunia ID | 12272 |
Source SecuriTeam URL | http://www.securiteam.com/windowsntfocus/5IP1200DPW.html |
Source tecchannel ID | 3535 |
Source Literature | Hacking Intern - Angriffe, Strategien, Abwehr, Marc Ruef, Marko Rogge, Uwe Velten and Wolfram Gieseke, November 1, 2002, Data Becker, Düsseldorf, ISBN 381582284X |
Source Misc. | http://www.computec.ch |