Mini Web Server Cross Site Scripting and Directory Traversal Vulnerabilities
BID:39780
Info
Mini Web Server Cross Site Scripting and Directory Traversal Vulnerabilities
| Bugtraq ID: | 39780 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 28 2010 12:00AM |
| Updated: | Apr 28 2010 12:00AM |
| Credit: | cp77fk4r |
| Vulnerable: |
Mini Web Server Mini Web Server 1.0 |
| Not Vulnerable: | |
Discussion
Mini Web Server Cross Site Scripting and Directory Traversal Vulnerabilities
Mini Web Server is prone to a directory-traversal vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting these issues will allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, and to view arbitrary local files and directories within the context of the webserver. This may let the attacker steal cookie-based authentication credentials and other harvested information may aid in launching further attacks.
Mini Web Server 1.0 is vulnerable; other versions may also be affected.
Mini Web Server is prone to a directory-traversal vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting these issues will allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, and to view arbitrary local files and directories within the context of the webserver. This may let the attacker steal cookie-based authentication credentials and other harvested information may aid in launching further attacks.
Mini Web Server 1.0 is vulnerable; other versions may also be affected.
Exploit / POC
Mini Web Server Cross Site Scripting and Directory Traversal Vulnerabilities
Attackers can exploit the cross-site scripting issue by enticing an unsuspecting victim to follow a malicious URI.
The following example data and URI are available:
GET %00"><font color=red>Work?</font><" HTTP/1.1
http://www.example.com/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c1.txt
Attackers can exploit the cross-site scripting issue by enticing an unsuspecting victim to follow a malicious URI.
The following example data and URI are available:
GET %00"><font color=red>Work?</font><" HTTP/1.1
http://www.example.com/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c1.txt
Solution / Fix
Mini Web Server Cross Site Scripting and Directory Traversal Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Mini Web Server Cross Site Scripting and Directory Traversal Vulnerabilities
References:
References:
- Mini Web Server - Homepage (Mini Web Server)