<<< Date Index >>>     <<< Thread Index >>>

Keene Digital Media Server Directory Traversal



##########################################################
# GulfTech Security Research              August, 25th 2004
##########################################################
# Vendor  : Keene Software
# URL     : http://www.keenesoftware.com
# Version : Keene Digital Media Server 1.0.2
# Risk    : Directory Traversal Vulnerability
##########################################################

Description:
Keene Digital Media Server is an easy and affordable way to 
share all things digital with friends, family, and customers 
over your broadband connection. DMS turns your computer into 
a highly secure Web server that automatically converts your 
files and folders into Web pages, thumbnails, and media shows 
with no Web programming required. Integrated user and file 
access security management provide the ultimate control over 
your content.


Directory Traversal Vulnerability:
Not too long ago I saw there was a directory traversal vuln
found in Keene Digital Media Server. it was fixed by the
developers, but

http://localhost/%2E%2E%5Csystem.log

It seems that only ../ and %2E%2E/ were filtered out. If you
hex encode the backslash or use a forward slash you can then
traverse out of the web directory. For example I am able to
grab the server log file with the above request.



Related Info:
The original advisory can be found at the following location
http://www.gulftech.org/?node=research&article_id=00046-08252004



Solution:
I contacted the developers but never received a response.



Credits:
James Bercegay of the GulfTech Security Research Team