|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68  |  uhttp Server Path Traversal Vulnerability  Nameuhttp Server  Vendorhttp://uhttps.sourceforge.net  Versions Affected 0.1.0-alpha  AuthorSalvatore Fresta aka Drosophila  Website http://www.salvatorefresta.net  Contact salvatorefresta [at] gmail [dot] com  Date2010-03-10 X. INDEX  I.ABOUT THE APPLICATION  II. DESCRIPTION  III.ANALYSIS  IV. SAMPLE CODE  V.FIX  VI. DISCLOSURE TIMELINE I. ABOUT THE APPLICATION An ultra lightweight webserver witha verysmallmemory usage. II. DESCRIPTION Bad chars are not properly sanitised. III. ANALYSIS Summary:  A) Path Traversal A) Path Traversal The problem is in the management of the bad chars that can beusedtolaunchsome attacks,such as the directory traversal. The path traversal sequence ('../') is not checked, soit can be used for seeking thedirectoriesof theaffected system. IV. SAMPLE CODE The following is a simple example: GET /../../../../../../etc/passwd HTTP/1.1 In this example, the daemon has been started in the follows path: /home/drosophila/downloads/uhttps/src V. FIX No patch. VIII. DISCLOSURE TIMELINE 2010-03-10 Bug discovered 2009-03-10 Advisory Release  |