[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Multiple Vulnerabilities In Xedus Webserver



##########################################################
# GulfTech Security Research               August, 30th 2004
##########################################################
# Vendor  : Jerod Moemeka
# URL     : http://www.thinxoft.com
# Version : Xedus 1.0
# Risk    : Multiple Vulnerabilities
##########################################################

Description:
Xedus is a Peer-to-Peer web server and provides you with the 
ability to share files, music, and any other media, as well 
as create robust and dynamic web sites, which can feature 
database access, file system access, with full .net support. 
Powered by a built in server-side, Microsoft C#, scripting 
language; Xedus boasts the ability to create sites that can 
rival web applications built on any other enterprise servers 
like Apache, IIS, Iplanet. With Xedus, you will never need 
to pay to host your sites again. Using the peer-to-peer mode, 
other members of LIVE can access you site by keyword using
Internet Explorer even if you do not have a static IP address!



Denial of Service:
Xedus Webserver cannot handle multiple connections from the 
same host, and will deny all access to any users after  a
number of connections are made from a malicious user. This
vulnerability can be leveraged by an attacker to deny all
requests to a website, thus rendering it inaccessible.



Cross Site Scripting:
Xedus Webserver comes with a number of test scripts. These
test scripts are used to display some of the capabilities of
the Xedus webserver. 

http://host:4274/test.x?username=[XSS]
http://host:4274/TestServer.x?username=[XSS]
http://host:4274/testgetrequest.x?param=[XSS]

However, the input received by some of these test scripts are 
not properly sanitized. Because the input is not properly
sanitized, it allows for an attacker to send a malicious url
that will then render malicious code in the context of a 
victim's web browser. A quick and easy way to resolve these xss
issues is to delete the .x files located in the ./sampledocs
folder of the Xedus Webserver installation.



Directory Traversal Vulnerability:
Xedus webserver does not properly sanitize requests sent to the
server. This vulnerability can be exploited to retrieve arbitrary, 
potentially sensitive files from the hosting computer with the 
privileges of the web server. This may aid a malicious user in 
further attacks.

http://host:4274/../data/log.txt
http://host:4274/../../../../../boot.ini
http://host:4274/../../../../../WINNT/repair/sam

It should be noted, that by default the Xedus Webserver listens
for incoming connections on port 4274, however this value can be
edited by the administrator of the Xedus webserver.



Solution:
I contacted the developers but never received a response. To
resolve the Cross Site Scripting issue, simply remove the sample
.x scripts located in the ./sampledocs directory



Related Info:
The original advisory can be found at the following location 
http://www.gulftech.org/?node=research&article_id=00047-08302004



Credits:
James Bercegay of the GulfTech Security Research Team