RE: [Full-Disclosure] Novell WebAcces
From: Horseman, Michael W. (michael.horseman_at_capgemini.com)
Date: Fri, 7 Jan 2005 13:24:21 -0500 To: <email@example.com>
I think maybe you're seeing the directory traversal vulnerability
identified in Groupwise. Groupwise 6 had this vulnerability as well as
previous versions if I remember right.
IT Security Analyst
"Any sufficiently advanced technology is indistinguishable from magic."
- Arthur C. Clarke
[mailto:firstname.lastname@example.org] On Behalf Of noAcces
Sent: Friday, January 07, 2005 3:42 AM
Subject: [Full-Disclosure] Novell WebAcces
I was playing around when I found a small problem with Novell's
With User.lang you can give in you're language as parameter I tried some
different stuff there and when I tried "> so that the URL would be
hxxp://www.notsohappyserver.com/servlet/webacc?User.Lang="> a Link
apeared I clicked it and so I found some unprotected dirs.
The problem is that the file
contains info about the servername context and install paths
It seems that this is working on almost every webacces server.
Kerst actie bij Lycos Mail: 50% korting op Lycos Xtra en Max!
This message contains information that may be privileged or confidential and is the property of the Capgemini Group. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain, copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message.
Full-Disclosure - We believe in it.