5336306 2000-08-07  08:57  /19 rader/ Brevbäraren (som är implementerad i) Python
Mottagare: Bugtraq (import) <12069>
Markerad av 2 personer.
Ärende: Dangerous Java/Netscape Security Hole
------------------------------------------------------------
From: Dan Brumleve <dan+security@BRUMLEVE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <20000805020429.11774.qmail@securityfocus.com>

Dear BugTraq,

I've found some security holes in Java and Netscape
that allow arbitrary network access and read-access
for local files and directories.  As a demonstration
I've written Brown Orifice HTTPD, a web server and file
sharing tool that runs in Netscape Communicator on all
tested platforms.  For more information, see:

http://www.brumleve.com/BrownOrifice

--
Dan Brumleve <dan+security@brumleve.com>
(5336306) ------------------------------------------
Kommentar i text 5336313
Kommentar i text 5336961 av Rikard Bosnjakovic (blev ingen Cendiot)
Kommentar i text 5342828 av Brevbäraren (som är implementerad i) Python
Läsa nästa kommentar.
5342828 2000-08-08  18:11  /48 rader/ Brevbäraren (som är implementerad i) Python
Mottagare: Bugtraq (import) <12113>
Kommentar till text 5336306 av Brevbäraren (som är implementerad i) Python
Extra kopia: Plötsliga lustigheter <3830>
    Sänt:     2000-08-08 23:31
    Sänt av David Hedbor (Real Networks)
Markerad av 1 person.
Ärende: Brown Orifice HTTPD Directory Traversal Vulnerability (was Re:
------------------------------------------------------------
 Dangerous Java/Netscape Security Hole)
From: "TAKAGI, Hiromitsu" <takagi@ETL.GO.JP>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <39900E4D185.7F0DTAKAGI@java-house.etl.go.jp>

=====================================================
Brown Orifice HTTPD Directory Traversal Vulnerability
=====================================================

Background
----------
  Brown Orifice HTTPD (BOHTTPD) <http://www.brumleve.com/BrownOrifice/>
  is "a web server and file sharing tool" that runs as a Java Applet in
  Netscape Navigator.(*1)  It was written by Dan Brumleve and was
  announced in BugTraq a few days ago.

Problem Description
-------------------
  Brumleve's demonstration page politely asks users to specify a
  directory on their computer for public access. However, by specifying
  "\.." in HTTP requests to the server, an attacker can navigate the
  server's file system and view/download any files. For example,
      http://your-ip-address:8080/C:/temp/\../
  or
      http://your-ip-address:8080/C:/temp/%5C../ (for Internet Explorer
      as a client)
  will display the contents of the root directory of C: drive of the
  server's computer.

Affected versions and platforms
-------------------------------
  This bug has been verified to be present on the BOHTTPD 0.1 in
  Netscape Navigator 4.72 for Windows.

Workaround
----------
  Do not use BOHTTPD.  :-)


(*1) This is also a security hole per se, as you know.

Regards,
--
Hiromitsu Takagi
Electrotechnical Laboratory
http://www.etl.go.jp/~takagi/
(5342828) ------------------------------------------

5347530 2000-08-09  20:29  /45 rader/ Brevbäraren (som är implementerad i) Python
Mottagare: Bugtraq (import) <12129>
Kommentar till text 5342828 av Brevbäraren (som är implementerad i) Python
Ärende: Re: Brown Orifice HTTPD Directory Traversal Vulnerability (was
------------------------------------------------------------
 Re: Dangerous Java/Netscape Security Hole)
From: "Michael H. Warfield" <mhw@WITTSEND.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <20000808121505.C18696@alcove.wittsend.com>

On Tue, Aug 08, 2000 at 10:42:37PM +0900, TAKAGI, Hiromitsu wrote:
	[...]

> Problem Description
> -------------------
>   Brumleve's demonstration page politely asks users to specify a
>   directory on their computer for public access. However, by specifying
>   "\.." in HTTP requests to the server, an attacker can navigate the
>   server's file system and view/download any files. For example,
>       http://your-ip-address:8080/C:/temp/\../
>   or
>       http://your-ip-address:8080/C:/temp/%5C../ (for Internet Explorer
>       as a client)
>   will display the contents of the root directory of C: drive of the
>   server's computer.

> Affected versions and platforms
> -------------------------------
>   This bug has been verified to be present on the BOHTTPD 0.1 in
>   Netscape Navigator 4.72 for Windows.

	This does not appear to be effective against Netscape Communicator
4.74 on Linux.  I get permission denied for any plain ".." in the path
anywhere and anything with "\.." or "%5c.." gets a Java runtime error
complaining that the directory "\.." was not found.

> Workaround
> ----------
>   Do not use BOHTTPD.  :-)

	:-)

	Mike
--
 Michael H. Warfield    |  (770) 985-6132   |  mhw@WittsEnd.com
  (The Mad Wizard)      |  (770) 331-2437   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!
(5347530) ------------------------------------------