Secunia Research: Xeneo Web Server Script Source Disclosure Vulnerability

====================================================================== 

                    Secunia Research 05/05/2006

    - Xeneo Web Server Script Source Disclosure Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software 

* Xeneo Web Server version 2.2.22.0

Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderately Critical
Impact: Exposure of sensitive information
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Xeneo Web Server,
which can be exploited by malicious people to disclose potentially
sensitive information.

The vulnerability is caused due to a validation error of the filename
extension supplied by the user in the URL. This can be exploited to
retrieve the source code of script files (e.g. ASP, PHP) from the
server via specially crafted requests containing dot, space and slash
characters.

====================================================================== 
4) Solution 

Filter malicious characters and character sequences in a proxy or
firewall with URL filtering capabilities.

====================================================================== 
5) Time Table 

22/03/2006 - Initial vendor notification.
29/03/2006 - Second vendor notification.
28/04/2006 - Third vendor notification.
05/05/2006 - Public disclosure. (No reply from vendor)

====================================================================== 
6) Credits 

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

No other references.

====================================================================== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-20/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================