Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 22 May 2013 13:38:32 +0000
From: George Theall <gtheall@...able.com>
To: "<oss-security@...ts.openwall.com>" <oss-security@...ts.openwall.com>
Subject: Re: Fwd: [Full-disclosure] Thttpd 2.25b Directory
 Traversal Vulnerability


On May 22, 2013, at 9:29 AM, Vitezslav Cizek <civ@...ma.cz>
 wrote:

> * Dne Středa 22. květen 2013, 13:44:09 [CEST] Oden Eriksson napsal:
>> onsdagen den 22 maj 2013 13.06.18 skrev  Matthias Weckbecker:
>>> Hi,
>>> 
>>> has anybody possibly already confirmed this? It might also be worth
>>> to assign a CVE to this if it turns out to be a reproducible issue.
>> 
>> Confirmed here. Needed to use "lynx -dump ...".
>> 
> Are you sure?
> I fail to reproducet the problem.

This seems like a configuration issue rather than a vulnerability. The code in libhttpd.c seems to filter directory traversal sequences. And I was able to reproduce this only if thttpd was serving files out of the system root directory (e.g., "thttpd -d /"), in which case the directory traversal sequences are irrelevant.


George
-- 
theall@...able.com

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.