exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SLA-17.Anaconda.txt

SLA-17.Anaconda.txt
Posted Oct 15, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-17 - A flaw in Linux/UNIX Anaconda Foundation Directory, a yahoo style search engine based on the Open Directory Project allows remote users to traverse the webservers filesystem, allowing arbitary files to be read by appending a trailing NULL byte in URL encoded format. Exploit URL included.

tags | exploit, remote
systems | linux, unix
SHA-256 | 114471e6a48ade395cf5dd9910cfbb9ebc5b97960e372c164656001a5ddd2840

SLA-17.Anaconda.txt

Change Mirror Download
        Synnergy Laboratories Advisory SLA-2000-17

NAME

Anaconda Foundation Directory NULL byte vulnerability

AFFECTED

Linux/UNIX with Anaconda Foundation Directory

SYNOPSIS

Synnergy Labs has found a flaw within Anaconda Foundation Directory that allow
s a user to
successfully traverse the filesystem on a remote host, allowing arbitary files
/folders to
be read.


DESCRIPTION

The Anaconda Foundation Directory is a Yahoo style search engine based on the
Open Directory
project, www.dmoz.org. The Anaconda Foundation Directory allows you to dynamic
ally integrate content into
your site's own look and feel. This is the exact same content that Lycos featu
res on their
front page! Product pricing is $499 US.

Anaconda Foundation Directory can be found at:https://anacondapartners.com/ap_a
fodpdemo.shtml

Synnergy has recently discovered a flaw within Anaconda Foundation Directory t
hat allows a remote
user to traverse the filesystem as a request to the script using the $template
=_some_file_. It is
then possible to read any file contents with priviledges as the httpd.
Although the script checks for the file extension (.htm, .html, .shtml, .stm)
adding a trailing
%00.html, (a NULL byte in URL encoded format), at the end of the request will
force the script to
open the file.

Example:

https://www.target.com/cgi-bin/apexec.pl?etype=odp&template=../../../../../../.
./../../etc/resolv.conf%00.html&passurl=/category/


The above line if given will output the file contents of /etc/resolv.conf.

SOLUTION

The vendors have been informed of the bug. It is advised to wait for the next
patched version of
Anaconda Foundation Directory to be released.


AUTHOR

Discovery: pestilence @ synnergy.net


DISCLAIMER

Synnergy Laboratories may not be held liable for the use or potential
effects of these programs or advisories, nor the content contained
within. Use them at your own risk.

COPYRIGHT

Synnergy Laboratories - www.synnergy.net (c) 1998-2000

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close