COMMAND

    WebPlus

SYSTEMS AFFECTED

    Talentsoft WebPlus Application Server

PROBLEM

    Followig  is  based  on  a  Delphis Consulting Advisory DST2K0032.
    It is possible to cause Webplus to reveal the physical path  which
    it  is  installed  within.   This  is  done  by  executing the CGI
    application and passing a single.  Example:

        http://127.0.0.1/cgi-bin/webplus.exe?script=.

    This will  respond with  an error  message detailing  the physical
    path.

    If your server is being NAT'd (i.e. located behind a firewall/load
    balancer) it is possible to  retrieve your internal IP address  by
    passing the about option to the cgi application.  Example:

        http://127.0.0.1/cgi-bin/webplus.exe?about

    It is possible to cause Webplus  to reveal the source code of  the
    WML files which are located on  NTFS partitions.  This is done  by
    appending the data stream you wish on to the WML file.  Example:

        http://127.0.0.1/cgi-bin/webplus.exe?script=test.wml::$DATA

    The danger  here as  the Delphis  team have  demonstrated is being
    able to access DSN information (datasource, table names, usernames
    & passwords).  It is also possible if the Script root has been set
    to the webroot to read the source code of other script files (i.e.
    ASP).  Example:

        http://127.0.0.1/cgi-bin/webplus.exe?script=test.asp::$DATA

SOLUTION
    Delphis are happy to announce that Talentsoft has a patch for  the
    above ::$DATA issue.  The following was information recieved  from
    the vendor.

    You require  build 542  (to fully  disable the  parsing of ::$DATA
    requires using a newly rebuilt webplus.dll in addition to the  use
    of build 542 of webpsvc.exe web+ server)).

    If  you  have  any  issues  obtaining  this  patch  please contact
    Talentsoft support.