[NT] Xedus Webserver Directory Traversal and DoS
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 2 Sep 2004 14:08:23 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Xedus Webserver Directory Traversal and DoS
<http://www.thinxoft.com> Xedus is a Peer-to-Peer web server and provides
you with the ability to share files, music, and any other media, as well
as create robust and dynamic web sites, which can feature database access,
file system access, with full .net support.
The Xedus web server is vulnerable to a directory traversal. In addition
some test scripts provided with the default installation are prone to
cross-site scripting (XSS). The server is also vulnerable to a DoS
* Xedus web server version 1.0
Xedus web server cannot handle multiple connections from the same host,
and will deny all access to any users after a number of connections are
made from a malicious user. This vulnerability can be leveraged by an
attacker to deny all requests to a website, thus rendering it
inaccessible. Although simple, this vulnerability constitutes a denial of
Xedus is also vulnerable to directory traversal that allows an attacker to
reach parts of the file system that are normally not even served by the
web server. Served files are files residing in the docs directory
(Apache's htdocs for example) and in any other directory that the server
is configured to serve from. The web server does not properly sanitize
requests received by clients. This vulnerability can be exploited to
retrieve arbitrary, potentially sensitive files from the hosting computer
with the privileges of the web server. This may aid a malicious user in
further attacks. Typical examples are:
It should be noted, that by default the Xedus web server listens for
incoming connections on port 4274, however this value can be edited by the
administrator of the Xedus web server.
The last vulnerability is not a vulnerability of the server software
itself but of the test scripts that are provided with it in a default
installation. The scripts are prone to XSS attacks, examples following:
The input received by some of these test scripts is not properly
sanitized. Because the input is not properly sanitized, it allows for an
attacker to send a malicious URL that will then render malicious code in
the context of a victim's web browser.
The information has been provided by <mailto:email@example.com>
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.