exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

falcon.2.0.txt

falcon.2.0.txt
Posted May 27, 2002
Authored by Tamer Sahin | Site securityoffice.net

The Falcon Web Server v2.0 for Windows 2000 allows remote users to gain read access of known password protected files residing on a Falcon Web Server.

tags | remote, web
systems | windows
SHA-256 | a16db8592601cc92d0e16282473fe839385c6245b47e4a65a486a7b596cdc3d3

falcon.2.0.txt

Change Mirror Download
--[ Falcon Web Server Unauthorized File Disclosure Vulnerability ]--

--[ Type

File Disclosure

--[ Release Date

May 26, 2002

--[ Product / Vendor

Falcon Web Server is a desktop web server capable of running a small /
medium website with a typical load of up to 50-80 hits per minute. The
server has the ability to execute ISAPI and WinCGI applications from
virtual directories.

https://www.blueface.com

--[ Summary

Due to a flaw in Falcon Web Server 2.0 for Windows, it is possible for a
user to gain read access of known password protected files residing on a
Falcon Web Server host.

https://host//protectedfolder/

--[ Tested

Windows 2000 / Falcon Web Server v2.0

--[ Vulnerable

Falcon Web Server v2.0 (And may be other.)

--[ Disclaimer

https://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on this
security advisory.

--[ Author

Tamer Sahin
ts@securityoffice.net
https://www.securityoffice.net

All our advisories can be viewed at https://www.securityoffice.net/articles/

Please send suggestions, updates, and comments to
feedback@securityoffice.net

(c) 2002 SecurityOffice

This Security Advisory may be reproduced and distributed, provided that
this Security Advisory is not modified in any way and is attributed to
SecurityOffice and provided that such reproduction and distribution is
performed for non-commercial purposes.

Tamer Sahin
https://www.securityoffice.net



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close