ID

VAR-E-200801-0321


CVE

cve_id:CVE-2008-0337

Trust: 1.9

cve_id:CVE-2008-0338

Trust: 1.3

sources: BID: 27319 // EXPLOIT-DB: 4923 // EDBNET: 29233

EDB ID

4923


TITLE

Miniweb 0.8.19 - Multiple Vulnerabilities - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 4923

DESCRIPTION

Miniweb 0.8.19 - Multiple Vulnerabilities. CVE-42781CVE-2008-0338CVE-42780CVE-2008-0337 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 4923

AFFECTED PRODUCTS

vendor:miniwebmodel: - scope:eqversion:0.8.19

Trust: 1.6

vendor:stanleymodel:huang miniwebscope:eqversion:0.8.19

Trust: 0.3

sources: BID: 27319 // EXPLOIT-DB: 4923 // EDBNET: 29233

EXPLOIT

MiniWeb Multiple Vulnerabilities

Introduction
MiniWeb is a mini HTTP server implementation written in C language,
featuring low system resource consumption, high efficiency, good
flexibility and high portability.
It is capable to serve multiple clients with a single thread,
supporting GET and POST methods, authentication, dynamic contents
(dynamic web page and page variable substitution) and file uploading.
MiniWeb runs on POSIX complaint OS, like Linux, as well as Microsoft Windows.

vulnerability discovered by : Hamid Ebadi (ebadi _AT_ bugtraq.ir)

http://www.bugtraq.ir

complete advisory and also source code auditing can be found at :

http://www.bugtraq.ir/adv/miniweb_persian.pdf (persian)
http://www.bugtraq.ir/adv/miniweb_english.pdf (english)

vulnerable version : MiniWeb 0.8.19 (C)2005 Written by Stanley Huang
http://miniweb.sourceforge.net/
http://sourceforge.net/projects/miniweb

Description:

directory traversals :

An input validation error in the URL request handling in
mwGetLocalFileName() function ( http.c) can be exploited to
disclose arbitrary files (and also Directory listing) outside the web
root via directory traversals attacks via the " /.%2e/" or "/%2e%2e/"
sequences

Proof of Concept :
Directory listing:
http://127.0.0.1:80/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/

disclose arbitrary files:
http://127.0.0.1:80/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/boot.ini

Heap based buffer overflow vulnerability :

There is also heap based buffer overflow in this web server
The vulnerability is caused due to a boundary error in
_mwProcessReadSocket() function (http.c) when handling HTTP requests.
This can be exploited by sending an overly long, specially crafted
request, which can cause a heap overflow and allow arbitrary code
execution with the privileges of the web service.

Proof of Concept :
GET /AAAA...[3600 - 4000]...AAAA/ HTTP/1.0

Solution:
Edit the source code (for more information see this article)

http://www.bugtraq.ir/adv/miniweb_persian.pdf (persian)
http://www.bugtraq.ir/adv/miniweb_english.pdf (english)

Copyright : http://www.bugtraq.ir

# milw0rm.com [2008-01-16]

Trust: 1.0

sources: EXPLOIT-DB: 4923

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 4923

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 4923

TYPE

Multiple Vulnerabilities

Trust: 1.6

sources: EXPLOIT-DB: 4923 // EDBNET: 29233

CREDITS

Hamid Ebadi

Trust: 0.6

sources: EXPLOIT-DB: 4923

EXTERNAL IDS

db:NVDid:CVE-2008-0337

Trust: 1.9

db:EXPLOIT-DBid:4923

Trust: 1.6

db:NVDid:CVE-2008-0338

Trust: 1.3

db:EDBNETid:29233

Trust: 0.6

db:BIDid:27319

Trust: 0.3

sources: BID: 27319 // EXPLOIT-DB: 4923 // EDBNET: 29233

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2008-0337

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2008-0338

Trust: 1.0

url:https://www.exploit-db.com/exploits/4923/

Trust: 0.6

url:http://sourceforge.net/projects/miniweb

Trust: 0.3

sources: BID: 27319 // EXPLOIT-DB: 4923 // EDBNET: 29233

SOURCES

db:BIDid:27319
db:EXPLOIT-DBid:4923
db:EDBNETid:29233

LAST UPDATE DATE

2022-07-27T09:28:39.317000+00:00


SOURCES UPDATE DATE

db:BIDid:27319date:2016-07-05T22:00:00

SOURCES RELEASE DATE

db:BIDid:27319date:2008-01-16T00:00:00
db:EXPLOIT-DBid:4923date:2008-01-16T00:00:00
db:EDBNETid:29233date:2008-01-16T00:00:00