Re: Vulnerability in AOLserver

2001-02-09 Thread bugtraq

>AOLserver v3.2 is a web server available from http://www.aolserver.com.
>A vulnerability exists which allows a remote user user to break out of the
>web root using relative paths (ie: '...').

> AOLserver v3.2 on Linux (RH 6.0) does not appear to be vulnerable.
> OS-dependent code?

Correct.  Microsoft Windows has an undocumented "feature" where '...\' or
'\' or '..\' point to parent directories.  This feature is obscure
un documented enough that almost every single web server ported to Windows
allows viewing of files above the document root with this feature.  In
fact, Microsoft's own personal web server had this problem at one point.

Linux has had similiar problems with undocumented interfaces.  It was
discovered about a year ago that by using undocumented calls that restrict
privledges, an attacker could set things up a a SUID root application
could not drop its root privledges.

- Sam



Re: Vulnerability in AOLserver

2001-02-06 Thread Michael A. Cleverly

On Tue, 6 Feb 2001 [EMAIL PROTECTED] wrote:

> Vulnerability in AOLserver
>
> Overview
>
> AOLserver v3.2 is a web server available from http://www.aolserver.com.
> A vulnerability exists which allows a remote user user to break out of the
> web root using relative paths (ie: '...').
>
> Details
>
> AOLServer checks the requested virtual path for any double dots ('..'),
> and returns a 'Not Found' error page if any are present.  However, it
> does not check for triple dots ('...').  Here is an example URL:
>
> http://localhost:8000/.../[file outside web root]
>
> Note that this vulnerability has only been tested on the latest stable
> release (v3.2) for the Win32 platform.
>
> Solution
>
> No quick fix is possible.
>
> Vendor Status
>
> America Online, Inc. was contacted via http://www.aolserver.com/feedback/
> on Tuesday, January 30, 2001.  No reply was received.

Here's a possible "quick fix".  It took me five minutes, but that was just
because I had to download AOLserver for Windoze and install it.  Simply
copy the following Tcl code into a .tcl file in either the servers private
or public Tcl library (c:\program files\aolserver\modules\tcl in the
default Windows installation) and restart AOLserver.


 cut here 

ns_register_filter preauth GET  /* windows_triple_dot_check
ns_register_filter preauth POST /* windows_triple_dot_check
ns_register_filter preauth HEAD /* windows_triple_dot_check

proc windows_triple_dot_check {args} {
if {[string match */...* [ns_conn url]]} {
ns_returnforbidden
return filter_return
} else {
return filter_ok
}
}

 cut here 

Regards,

Michael A. Cleverly
[EMAIL PROTECTED]