AOLserver v3.4.2 for Windows has a remote vulnerability which allows users to gain read access of known password protected files residing on an AOLserver host.
7fb93b6be8c7f43a99b7ec8616ce778988a9cbbe97e38d11620a6b969a3101db
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
AOLserver 3.4.2 Unauthorized File Disclosure Vulnerability
Type:
File Disclosure
Release Date:
January 6, 2002
Product / Vendor:
AOLserver is America Online's Open-Source web server. AOLserver is
the backbone of the largest and busiest production environments in
the world. AOLserver is a multithreaded, Tcl-enabled web server used
for large scale, dynamic web sites.
https://www.aolserver.com
Summary:
Due to a flaw in AOLserver 3.4.2 for Windows, it is possible for a
user to gain read access of known password protected files residing
on a AOLserver host.
https://host/passwordprotected.file.
Example:
https://host/nstelemetry.adp.
Tested:
Windows 2000 / AOLserver 3.4.2
Vulnerable:
AOLserver 3.4.2 for Windows
(Unix versions not affect this vulnerability)
Disclaimer:
https://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.
Author:
Tamer Sahin
ts@securityoffice.net
https://www.securityoffice.net
Tamer Sahin
https://www.securityoffice.net
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <https://www.pgp.com>
iQA/AwUBPDfjqbuLpFMrXtywEQK3yACg54P+AUsgY2eGAIa2xharaPuJr/oAnimD
+BJ2YUdAu8f3hDhfoj3rLMcw
=pLhO
-----END PGP SIGNATURE-----