BSR Webweaver version 1.33 suffers from a restriction bypass vulnerability.
7e871c738088da2a33b231cf21c90caebbf55f2ad1585bc09ebd675bda0edeef
###########################################################################################
#
# Name : BSR Webweaver Version 1.33 /Scripts access restriction bypass vulnerbility
# Author : Usman Saeed
# Company : Xc0re Security Reasearch Group
# Date : 15/09/09
# Homepage : https://www.xc0re.net
#
###########################################################################################
[*] Download Page : https://www.brswebweaver.com/downloads.html
[*] Attack type : Remote
[*] Patch Status : Unpatched
[*] Description : In ISAPI/CGI path is [%installdirectory%/scripts] and
through HTTP the alias is [https://[host]/scripts] ,
The access security check is that if the attacker tries to access /scripts
a 404 Error response occurs ! Now to bypass and
check the directory listing [That is if Directory Browsing is allowed in
the server Configuration !] just copy and paste the
exploit url !.
This is the reason this exploit is not called a Directory Listing Exploit !
[*] Exploitation :
[+] https://127.0.0.1/scripts/%bg%ae%bg%ae/.exe