COMMAND
SITEWare
SYSTEMS AFFECTED
ScreamingMedia SITEWare 2.5, 3.0
PROBLEM
Following is based on Foundstone Labs Advisory FS-061201-19-SMSW
by Mike Shema. A vulnerability exists with ScreamingMedia's
SITEWare Editor's Desktop which allows for the arbitrary viewing
of world-readable files anywhere on the system.
The SITEWare Editor's Desktop is a web-based administration
front-end for ScreamingMedia content. The listening server can be
assigned an arbitrary port on which to listen. The default login
page is accessed by the URL:
/SWEditServlet?station_path=Z&publication_id=2043&template=login.tem
The SWEditServlet usually accesses templates from the
"../SITEWare/Control/" directory; however, the servlet will
follow directory path traversal. Therefore, by accessing the
SWEditServlet and requesting an arbitrary template it is possible
to view the source of that file. On a Solaris system, the
following resource path will reveal the contents of /etc/passwd:
/SWEditServlet?station_path=Z&publication_id=2043&template=../../../../../../../../../../../etc/passwd
As for exploit, from a browser, make the following URL request:
http://server:port/SWEditServlet?station_path=Z&publication_id=2043&template=../../../../../../../etc/passwd
SOLUTION
Please contact the vendor for a solution. Customers should obtain
upgraded software by contacting their customer support
representative to obtain patches.