what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

guardadv.db4web.txt

guardadv.db4web.txt
Posted Sep 21, 2002
Authored by Stefan Bagdohn | Site guardeonic.com

Guardeonic Solutions Security Advisory #01-2002 - The DB4Web Application Server for Linux, Unix, and Windows can be accessed with malicious URLs allowing users to download any readable file on the server. Exploit URL's included.

tags | exploit
systems | linux, windows, unix
SHA-256 | 97fbf379d789be0c379499bd4276220c2b084d6420f0cbae8ecd29fc7fb1cee7

guardadv.db4web.txt

Change Mirror Download
Guardeonic Solutions AG (www.guardeonic.com)

Security Advisory #01-2002

Advisory Name: DB4Web (R) File Disclosure
Release Date: 09/17/02
Affected Product: DB4Web (R) Application Server
Platform: Linux, *nix, MS Windows
Version: Unknown

Severity: A DB4Web component allows files on the server to be
downloaded

Author: Stefan Bagdohn <stefan.bagdohn@guardeonic.com>
<buggy@segmentationfault.de>

Vendor Communication: 08/29/02 Initial Notification via email to
support@db4web.de,
cc: Juergen.Kettlitz@siemens.com
08/30/02 Got vendor receipt via phone
09/02/02 Phone call by vendor regarding details
09/09/02 Second email to vendor asking for patch
status information
09/16/02 Phone call and email from vendor,
Update/Patch available

Overview:

(From vendors website): "DB4Web, Your Application Server for high performance
and secure Web-Applications with access to various data sources"
...
"DB4Web (R) is a high-performance application server that makes available a
multitude of data sources on the Web. This means that you can simultaneously
read from and write to relational databases and a multitude of other
information sources and applications through Intranet or the Internet."
(end of vendor citation)

The DB4Web (R) application can be misused to view (resp. download) files
located on the server by sending special http requests.

Decription:

A DB4Web (R) server accessed with a webbrowser usually requests local or remote
databases to generate dynamic html pages. By requesting malicious URLs one can
manipulate the server application to disclose files located on the server
system. The browser will download them and (according to the mime-type) show
them directly within the browser window.
The db4web_c binary (on Unix/Linux systems) or db4web_c.exe binary (on
MS Windows) is located within the cgi-bin (scripts) directory of the
webserver on the DB4Web (R) system. This binary executes the database query
and is accessibly by the clients webbrowser.

Example:

On MS Windows systems the URL to retrieve the boot.ini file would
look like:
http://db4web.server.system/scripts/db4web_c.exe/dbdirname/c%3A%5Cboot.ini

On Linux/Unix servers the following URL will show /etc/hosts:
http://db4web.server.system/cgi-bin/db4web_c/dbdirname//etc/hosts

In the above examples db4web.server.system means the Name or IP address of
the server, dbdirname ist the name of the local database directory and
%3A%5C is the representation of :\ needed to access c:\boot.ini.

One can also download files, cmd.exe for example, by requesting
c%3A%5Cwinnt%5Csystem32%5Ccmd.exe.

Solution:

The DB4Web team provided an update of their software and notified their
customers about the problem. The patches can be found at:
http://www.db4web.de/DB4Web/home/DB4Web/hotfix_e.html

Credit:

Thanks to the DB4Web team for good cooperation and fast response!

(more to come...)
EOF

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close