COMMAND
SITEWare
SYSTEMS AFFECTED
SITEWare 2.5, 3.0
PROBLEM
Following is based on Foundstone Labs Advisory FS-061201-18-SMSW
by Mike Shema. A source code disclosure vulnerability exists with
ScreamingMedia's SITEWare Editor's Desktop. This vulnerability
allows for the arbitrary viewing of world-readable files within
the web document root. It should also be noted that ScreamingMedia
stores site user names and passwords in clear text files.
The SITEWare Editor's Desktop is a web-based administration
front-end for ScreamingMedia content. The listening server can be
assigned an arbitrary port on which to listen. For example,
template source can be viewed by the URL:
http://server:30001/../../template/shared/indexTemplate.xml
Any file within the SITEWare/threads/Editor directory can be
viewed, but not system files outside of this root.
As for exploit, from a browser, make the following URL request:
http://server:30001/../../template/shared/indexTemplate.xml
SOLUTION
Refer to the advisory published by ScreamingMedia at:
http://www.screamingmedia.com/security/sms1001.php
Customers should obtain upgraded software by contacting their
customer support representative to obtain patches.