what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

avm-traversal.txt

avm-traversal.txt
Posted Jan 20, 2007
Authored by H. Wiedemann

The AR7 webserver included in the AVM UPNP service for windows suffers from a directory traversal flaw.

tags | exploit, file inclusion
systems | windows
SHA-256 | 73a8497aa93f7bfe962d0916345fd837b5ecc1afec3e6a75ca618e714c2188bd

avm-traversal.txt

Change Mirror Download
- Description
The "AVM IGD CTRL Service", a Universal Plug and Play (UPNP) service for
windows, which is part of the software package "Fritz!DSL Software
02.02.29" provides the possibility to read any file on the windows
system partition for any user - no matter how much restricted rights the
user has.
It is even possible to read files from any LAN computer on which this
service is running and it is possible to read critical system files (SAM
DB copies, profile files of any user) because the service is running
under the (locally) most privileged system account.

The mentioned software package is shipped with VOIP routers from the
german company AVM (www.avm.de).


- Reproduction
Relative URLs for the AR7 webserver (which is part of the mentioned UPNP
service) can be used to read files on the system partition. Because
backslashes can't be directly used in a URL "%5C" has to be used.

Examples for local and remote files of LAN computers:
http://localhost:49001/..%5C..%5C..%5Cwindows%5Csystem.ini
http://192.168.178.20:49001/..%5C..%5C..%5Cwindows%5Csystem.ini


- Workaround
Disable the "AVM IGD CTRL Service" under the services control panel.


Regards,

--

DPR

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close