ID SECURITYVULNS:DOC:7289 Type securityvulns Reporter Securityvulns Modified 2004-12-06T00:00:00
Description
-= Security Advisory =-
Advisory Information
Software Package : Hosting Controller
Vendor Homepage : http://www.hostingcontroller.com
Platforms : Windows based servers
Vulnerable Versions: All version ( Tested on: v.6.1 Hotfix 1.4 )
Vendor Contacted : 12/5/2004
Release Date: : 12/7/2004
Summary
Hosting Controller is a complete array of Web hosting automation tools
for the Windows Server family platform.
Hosting Controller has a security flaw which allows attackers to browse
any file and any directory on that server.
Details
Vulnerability - Directories Browsing files on the system.
Foolish vulnerability:
1)This vulnerability is on the admin/mail/Statsbrowse.asp and attackers
can view the Harddisk by using this file.
Login with your account
http://www.yoursite.com/admin
Now you see
http://www.yoursite.com/admin/main.asp
Change this url to
http://www.yoursite.com/admin/mail/Statsbrowse.asp?
FilePath=c:\&Opt=3&level=1&upflag=0
2)This vulnerability is on the admin/iis/Generalbrowse.asp and attackers
can view the Harddisk by using this file.
Login with your account
http://www.yoursite.com/admin
Now you see
http://www.yoursite.com/admin/main.asp
Change this url to <br/>
http://www.yoursite.com/admin/iis/Generalbrowse.asp?FilePath=C:\
Solution
The vender was notified, they have released a patch.
Update Your software
Credits
Discovered on May 6, 2004 by (\/) Mouse
Mouse@Shabgard.org
Additional Research: s7az2mm and bl2k
http://Shabgard.org
{"id": "SECURITYVULNS:DOC:7289", "bulletinFamily": "software", "title": "Hosting Controller", "description": " -= Security Advisory =-\r\n\r\nAdvisory Information\r\n-------------------------\r\n\r\nSoftware Package : Hosting Controller\r\nVendor Homepage : http://www.hostingcontroller.com\r\nPlatforms : Windows based servers\r\nVulnerable Versions: All version ( Tested on: v.6.1 Hotfix 1.4 )\r\nVendor Contacted : 12/5/2004\r\nRelease Date: : 12/7/2004\r\n\r\nSummary\r\n------------\r\n\r\nHosting Controller is a complete array of Web hosting automation tools \r\nfor the Windows Server family platform.\r\nHosting Controller has a security flaw which allows attackers to browse \r\nany file and any directory on that server.\r\n\r\nDetails\r\n---------\r\n\r\nVulnerability - Directories Browsing files on the system.\r\nFoolish vulnerability:\r\n\r\n1)This vulnerability is on the admin/mail/Statsbrowse.asp and attackers \r\ncan view the Harddisk by using this file.\r\nLogin with your account\r\nhttp://www.yoursite.com/admin\r\nNow you see\r\nhttp://www.yoursite.com/admin/main.asp\r\nChange this url to\r\nhttp://www.yoursite.com/admin/mail/Statsbrowse.asp?\r\nFilePath=c:\&Opt=3&level=1&upflag=0\r\n\r\n\r\n2)This vulnerability is on the admin/iis/Generalbrowse.asp and attackers \r\ncan view the Harddisk by using this file.\r\nLogin with your account\r\nhttp://www.yoursite.com/admin\r\nNow you see\r\nhttp://www.yoursite.com/admin/main.asp\r\nChange this url to <br/>\r\nhttp://www.yoursite.com/admin/iis/Generalbrowse.asp?FilePath=C:\\r\n\r\nSolution\r\n----------\r\n\r\nThe vender was notified, they have released a patch.\r\nUpdate Your software\r\n\r\nCredits\r\n---------\r\n\r\nDiscovered on May 6, 2004 by (\/) Mouse\r\nMouse@Shabgard.org\r\nAdditional Research: s7az2mm and bl2k\r\nhttp://Shabgard.org\r\n\r\nReferences\r\n-------------\r\n\r\nhttp://isun.Shabgard.org/hc.html\r\nhttp://isun.Shabgard.org/hc.txt\r\n", "published": "2004-12-06T00:00:00", "modified": "2004-12-06T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:7289", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:11", "edition": 1, "viewCount": 19, "enchantments": {"score": {"value": 3.0, "vector": "NONE", "modified": "2018-08-31T11:10:11", "rev": 2}, "dependencies": {"references": [{"type": "threatpost", "idList": ["THREATPOST:F3563336B135A1D7C1251AE54FDC6286"]}, {"type": "nessus", "idList": ["EULEROS_SA-2020-1318.NASL", "EULEROS_SA-2020-1323.NASL", "EULEROS_SA-2020-1314.NASL", "DEBIAN_DLA-2164.NASL", "FREEBSD_PKG_40194E1C6D8911EA808280EE73419AF3.NASL", "EULEROS_SA-2020-1299.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562311220201314", "OPENVAS:1361412562311220201299", "OPENVAS:1361412562311220201323", "OPENVAS:1361412562311220201318", "OPENVAS:1361412562310892164"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2164-1:52F3C"]}, {"type": "zdt", "idList": ["1337DAY-ID-34159", "1337DAY-ID-34153", "1337DAY-ID-34157", "1337DAY-ID-34144", "1337DAY-ID-34134"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:10149"]}, {"type": "kitploit", "idList": ["KITPLOIT:1907207623071471216"]}], "modified": "2018-08-31T11:10:11", "rev": 2}, "vulnersScore": 3.0}, "affectedSoftware": [], "immutableFields": []}
{"rst": [{"lastseen": "2021-04-11T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **116[.]90.83.234** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **12**.\n First seen: 2020-12-27T03:00:00, Last seen: 2021-04-11T03:00:00.\n IOC tags: **generic**.\nASN 4847: (First IP 116.90.80.0, Last IP 116.90.95.255).\nASN Name \"CNIXAP\" and Organisation \"China Networks InterExchange\".\nASN hosts 48263 domains.\nGEO IP information: City \"\", Country \"China\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-27T00:00:00", "id": "RST:42127B83-7289-3BF9-AB02-52850F963B5A", "href": "", "published": "2021-04-13T00:00:00", "title": "RST Threat feed. IOC: 116.90.83.234", "type": "rst", "cvss": {}}, {"lastseen": "2021-04-12T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **121[.]254.169.122** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **37**.\n First seen: 2021-04-02T03:00:00, Last seen: 2021-04-12T03:00:00.\n IOC tags: **generic**.\nASN 3786: (First IP 121.254.138.0, Last IP 121.254.184.255).\nASN Name \"LGDACOM\" and Organisation \"LG DACOM Corporation\".\nASN hosts 423624 domains.\nGEO IP information: City \"\", Country \"South Korea\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-04-02T00:00:00", "id": "RST:F89F966C-7289-3907-AE6A-ABBEA694D3E2", "href": "", "published": "2021-04-13T00:00:00", "title": "RST Threat feed. IOC: 121.254.169.122", "type": "rst", "cvss": {}}, {"lastseen": "2021-04-04T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **175[.]25.27.131** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **0**.\n First seen: 2020-01-19T03:00:00, Last seen: 2021-04-04T03:00:00.\n IOC tags: **generic**.\nASN 23724: (First IP 175.25.26.0, Last IP 175.25.47.255).\nASN Name \"CHINANETIDCBJAP\" and Organisation \"IDC China Telecommunications Corporation\".\nASN hosts 89989 domains.\nGEO IP information: City \"\", Country \"China\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-01-19T00:00:00", "id": "RST:3DF304E7-7289-34E6-A301-A4F02BECC1CF", "href": "", "published": "2021-04-12T00:00:00", "title": "RST Threat feed. IOC: 175.25.27.131", "type": "rst", "cvss": {}}, {"lastseen": "2021-04-04T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **202[.]104.147.26** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2019-11-27T03:00:00, Last seen: 2021-04-04T03:00:00.\n IOC tags: **generic**.\nASN 4134: (First IP 202.104.140.0, Last IP 202.104.159.255).\nASN Name \"CHINANETBACKBONE\" and Organisation \"No31Jinrong Street\".\nASN hosts 1193465 domains.\nGEO IP information: City \"\", Country \"China\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-11-27T00:00:00", "id": "RST:03F3C66D-7289-302A-A35B-0A9C3828914C", "href": "", "published": "2021-04-12T00:00:00", "title": "RST Threat feed. IOC: 202.104.147.26", "type": "rst", "cvss": {}}, {"lastseen": "2021-04-10T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **208[.]101.95.10** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **44**.\n First seen: 2021-04-10T03:00:00, Last seen: 2021-04-10T03:00:00.\n IOC tags: **generic**.\nASN 35911: (First IP 208.101.64.0, Last IP 208.101.127.255).\nASN Name \"BNQ1\" and Organisation \"Telebec\".\nASN hosts 501 domains.\nGEO IP information: City \"Matheson\", Country \"Canada\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-04-10T00:00:00", "id": "RST:BB489514-7289-3D1F-AD98-846BB33D3BCA", "href": "", "published": "2021-04-10T00:00:00", "title": "RST Threat feed. IOC: 208.101.95.10", "type": "rst", "cvss": {}}, {"lastseen": "2021-04-08T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **211[.]36.142.28** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **44**.\n First seen: 2021-04-08T03:00:00, Last seen: 2021-04-08T03:00:00.\n IOC tags: **generic**.\nASN 17853: (First IP 211.36.128.0, Last IP 211.36.159.255).\nASN Name \"LGTELECOMASKR\" and Organisation \"LGTELECOM\".\nASN hosts 12 domains.\nGEO IP information: City \"Yeongdeungpogu\", Country \"South Korea\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-04-08T00:00:00", "id": "RST:FE2FC8EF-7289-3E97-9C4E-F9344D42684F", "href": "", "published": "2021-04-08T00:00:00", "title": "RST Threat feed. IOC: 211.36.142.28", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-11T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **139[.]227.191.31** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **40**.\n First seen: 2021-03-05T03:00:00, Last seen: 2021-03-11T03:00:00.\n IOC tags: **generic**.\nASN 17621: (First IP 139.227.174.0, Last IP 139.227.225.255).\nASN Name \"CNCGROUPSH\" and Organisation \"China Unicom Shanghai network\".\nASN hosts 11599 domains.\nGEO IP information: City \"Shanghai\", Country \"China\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-03-05T00:00:00", "id": "RST:42727F3F-7289-3E29-8AF2-BFC1288AB38F", "href": "", "published": "2021-04-08T00:00:00", "title": "RST Threat feed. IOC: 139.227.191.31", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-31T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **www2[.]cr.mufg.brb6n5.cn** in [RST Threat Feed](https://rstcloud.net/profeed) with score **53**.\n First seen: 2021-03-31T03:00:00, Last seen: 2021-03-31T03:00:00.\n IOC tags: **phishing**.\nDomain has DNS A records: 155[.]94.179.194\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-03-31T00:00:00", "id": "RST:BB5C43FE-7289-3889-8C4B-BB8439AF4E80", "href": "", "published": "2021-03-31T00:00:00", "title": "RST Threat feed. IOC: www2.cr.mufg.brb6n5.cn", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-30T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **mail[.]o2-bill-failure.co.uk** in [RST Threat Feed](https://rstcloud.net/profeed) with score **56**.\n First seen: 2021-03-30T03:00:00, Last seen: 2021-03-30T03:00:00.\n IOC tags: **phishing**.\nDomain has DNS A records: 63[.]250.38.60\nWhois:\n Created: 2021-03-22 00:00:00, \n Registrar: Namecheap Inc Tag NAMECHEAPINC, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-03-30T00:00:00", "id": "RST:00808D4C-7289-3D85-BCA2-1D7E634FE744", "href": "", "published": "2021-03-30T00:00:00", "title": "RST Threat feed. IOC: mail.o2-bill-failure.co.uk", "type": "rst", "cvss": {}}, {"lastseen": "2021-03-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **http://178[.]175.30.126:35026/mozi.m** in [RST Threat Feed](https://rstcloud.net/profeed) with score **19**.\n First seen: 2021-03-26T03:00:00, Last seen: 2021-03-26T03:00:00.\n IOC tags: **malware**.\nIt was found that the IOC is used by: **mozi**.\nIOC could be a **False Positive** (Resource unavailable).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-03-26T00:00:00", "id": "RST:96559E7E-7289-3ACA-8FC2-FE68B178B528", "href": "", "published": "2021-03-26T00:00:00", "title": "RST Threat feed. IOC: http://178.175.30.126:35026/mozi.m", "type": "rst", "cvss": {}}]}