[Full-Disclosure] Advisory: Webster HTTP Server
mattmurphy at kc.rr.com
Sun Dec 1 03:05:22 GMT 2002
-----BEGIN PGP SIGNED MESSAGE-----
Webster HTTP Server is an HTTP/1.0 server written in C++ using Microsoft
Foundation Classes (MFC). It runs on Windows 95, 98, NT, 2000, Me, and XP
platforms. It was first published as a sample application in Microsoft
Journal (MSJ). Multiple security flaws have been identified in Webster that
could allow an attacker to take various actions on the server, ranging from
script execution to complete compromise.
There are three vulnerabilities in Webster, all related to the processing of
I. Buffer Overrun
There is a security flaw in Webster that allows an attacker to completely
compromise the server. If given a URI that is 275 characters or longer, the
saved return address will be overwritten. Execution of arbitrary code is
II. Directory Traversal
Another seperate security flaw occurs with poor path validation. Webster
will follow '/../' sequences in URL path names, allowing access to files
above the document root. This vulnerability may be used for further
compromise if security sensitive files are retreived (the Windows NT SAM
file, for instance).
III. Cross-site Scripting
Another small vulnerability was uncovered in Webster. If a path name
containing HTML markup is used, that path will be returned to the browser as
HTML content, enabling zone bypass.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0 (Build 349) Beta
-----END PGP SIGNATURE-----
Full-Disclosure is hosted and sponsored by Secunia.