SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   SimpleCam Vendors:   Dead Pirate Software
SimpleCam Directory Traversal Flaw Discloses Files to Remote Users
SecurityTracker Alert ID:  1013888
SecurityTracker URL:  http://securitytracker.com/id/1013888
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 4 2005
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 1.2
Description:   Donato Ferrante reported a vulnerability in SimpleCam. A remote user can view files on the target system.

The web service does not properly validate user-supplied HTTP requests. A remote user can submit a specially crafted request containing '..\' directory traversal characters to view arbitrary files on the target system.

A demonstration exploit URL is provided:

http://[target]/..\..\..\..\..\..\..\..\..\..\..\..\windows\system.ini

Impact:   A remote user can view arbitrary files on the target system.
Solution:   The vendor has issued a fixed version (1.3), available at:

http://www.deadpirate.com/index.php?page=download

Vendor URL:  www.deadpirate.com/ (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  directory traversal in SimpleCam 1.2



                           Donato Ferrante


Application:  SimpleCam
              http://www.deadpirate.com/

Version:      1.2

Bug:          directory traversal

Date:         04-May-2005

Author:       Donato Ferrante
              e-mail: fdonato@autistici.org
              web:    www.autistici.org/fdonato



xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

1. Description
2. The bug
3. The code
4. The fix



xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

----------------
1. Description:
----------------

Vendor's Description:

"SimpleCam is an easy to use webcam software product. It is designed
for people who want to stream live video from their computers without
paying a fortune or signing up for a service."



xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

------------
2. The bug:
------------

The program has a built-in webserver that is not able to manage
patterns like "..\" into http requests.
So an attacker can go out the document root assigned to the webserver
and see/download all the files available on the remote system.



xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

-------------
3. The code:
-------------

To test the vulnerability:

http://[host]/..\..\..\..\..\..\..\..\..\..\..\..\windows\system.ini



xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

------------
4. The fix:
------------

Bug fixed in the version 1.3.



xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC