Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Servers :: homeseer.htm

HomeSeer 1.4.29 built-in webserver Directory traversal vulnerability



Vulnerability

    HomeSeer

Affected

    HomeSeer prior to 1.4.29

Description

    Following is based on a SNS Research Security Advisory.   HomeSeer
    is home automation software for Windows 2000, Windows NT,  Windows
    98, and Windows 95 that uses inexpensive X10 technology to control
    your lights, appliances, and  audio/video equipment.  A  webserver
    is build in, allowing you  to even remote control your  appliances
    over the Internet.

    Adding the  string "../"  to an  URL allows  an attacker  to files
    outside of the webserver's publishing directory.  This allows read
    access to any file on the server.  Example:

        http://localhost:80/../../../autoexec.bat

    reads the file "autoexec.bat" from the partition's root dir.

Solution

    Vendor has been  notified and has  acknowledged this problem.   It
    has  been  fixed  in  the  1.4.29  (beta-)version  of the HomeSeer
    software which is availble from

        http://www.keware.com/kewarebeta.htm

    and will be included in the  future 1.5 release.  This was  tested
    against  HomeSeer  1.4.   Older   versions  can  be  expected   to
    vulnerable, users are encouraged to upgrade.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH