SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Calendar)  >   vCAP Vendors:   Paul Smith Computer Services
vCAP Lets Remote Users Deny Service or Traverse the Directory
SecurityTracker Alert ID:  1016822
SecurityTracker URL:  http://securitytracker.com/id/1016822
CVE Reference:   CVE-2006-5033, CVE-2006-5034   (Links to External Site)
Updated:  Jun 3 2008
Original Entry Date:  Sep 11 2006
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  
Version(s): 1.9.0 Beta and prior versions
Description:   Securma Massine of the MorX Security Research Team reported a vulnerability in vCAP. A remote user can cause denial of service conditions. A remote user can view files on the target system.

A remote user can send specially crafted data to cause denial of service conditions.

A demonstration exploit URL is provided:

http://[target]:6100/StoresAndCalendarsList.cgi?session=%d%d%d%d%d

The software does not properly validate user-supplied input. A remote user can supply a specially crafted request containing '../' directory traversal characters to view files on target system that are located outside of the intended directory. This can be exploited, for example, to obtain passwords in the 'vCAP.db' database file.

A demonstration exploit URL is provided:

http://[target]:6100/../Data/vCAP.db

The vendor was notified on August 16, 2006.

The original advisory is available at:

http://www.morx.org/vcap.txt

Impact:   A remote user can cause denial of service conditions.

A remote user can view files on the target system.

Solution:   No solution was available at the time of this entry.
Vendor URL:  www.pscs.co.uk/ (Links to External Site)
Cause:   Input validation error
Underlying OS:   Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Mon, 11 Sep 2006 17:44:37 -0000
Subject:  vCAP calendar server Multiple vulnerabilities

title: vCAP calendar server Multiple vulnerability
 
Author: securma massine <securma@morx.org>
MorX Security Research Team
http://www.morx.org
 
Product info : vCAP (www.pscs.co.uk)is a network calendar server for Windows. vCAP 
allows user to create calendars which can be viewed and modified by people on  network 
using a web browser.
 
Original Advisory/PoC : http://www.morx.org/vcap.txt
 
Severity: Medium/High - user can remotely attack the server
 
Vulnerability Description:
v1: denial of service attack with a specific request
v2: directory traversal , any file on the system can be downloaded  ,especially vCAp's 
passwords  (vCAP.db)
 
Affected Software(s): vCAP calendar server 1.9.0 Beta and prior
 
Affected platform(s): Windows
 
Exploit/Proof of Concept:
v1- http://127.0.0.1:6100/StoresAndCalendarsList.cgi?session=%d%d%d%d%d
v2- http://127.0.0.1:6100/../Data/vCAP.db
 
Solution : ??
 
History:
16/08/2006   initial vendor contact
17/08/2006   sending vulnerability details
31/08/2006   vulnerability confirmed
 

Disclaimer:
this entire document is for eductional, testing and demonstrating purpose only.The 
author do not have any responsibility for any malicious use of this advisory or proof 
of concept code.
 
 
 
 
 
 
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC