what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

avm-traversal.txt

avm-traversal.txt
Posted Jan 20, 2007
Authored by H. Wiedemann

The AR7 webserver included in the AVM UPNP service for windows suffers from a directory traversal flaw.

tags | exploit, file inclusion
systems | windows
SHA-256 | 73a8497aa93f7bfe962d0916345fd837b5ecc1afec3e6a75ca618e714c2188bd

avm-traversal.txt

Change Mirror Download
- Description
The "AVM IGD CTRL Service", a Universal Plug and Play (UPNP) service for
windows, which is part of the software package "Fritz!DSL Software
02.02.29" provides the possibility to read any file on the windows
system partition for any user - no matter how much restricted rights the
user has.
It is even possible to read files from any LAN computer on which this
service is running and it is possible to read critical system files (SAM
DB copies, profile files of any user) because the service is running
under the (locally) most privileged system account.

The mentioned software package is shipped with VOIP routers from the
german company AVM (www.avm.de).


- Reproduction
Relative URLs for the AR7 webserver (which is part of the mentioned UPNP
service) can be used to read files on the system partition. Because
backslashes can't be directly used in a URL "%5C" has to be used.

Examples for local and remote files of LAN computers:
http://localhost:49001/..%5C..%5C..%5Cwindows%5Csystem.ini
http://192.168.178.20:49001/..%5C..%5C..%5Cwindows%5Csystem.ini


- Workaround
Disable the "AVM IGD CTRL Service" under the services control panel.


Regards,

--

DPR

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close