Secunia Research: WhatsUp Small Business Report Service Directory Traversal

====================================================================== 

                     Secunia Research 03/11/2005

    - WhatsUp Small Business Report Service Directory Traversal -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

Ipswitch WhatsUp Small Business 2004

Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Less critical 
Impact: Exposure of system information
        Exposure of sensitive information
Where:  Local Network

====================================================================== 
3) Vendor's Description of Software 

"Ipswitch WhatsUp Small Business provides the critical functions you
need to monitor and protect a small network, without the complexity
or high cost".

Product Link:
http://www.ipswitch.com/products/whatsup/small_business/index.asp

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in Ipswitch WhatsUp
Small Business 2004, which can be exploited by malicious people to
gain knowledge of sensitive information.

The vulnerability is caused due to missing input validation in the
Report service (port 8022/tcp) and can be exploited to view the
contents of arbitrary files on the system via directory traversal
attacks.

Example:
http://[host]:8022/../../../../../[file]

====================================================================== 
5) Solution 

Restrict access to the vulnerable service.

====================================================================== 
6) Time Table 

26/05/2005 - Vendor notified.
26/05/2005 - Vendor response.
02/11/2005 - Advisory released by Cirt.dk.
03/11/2005 - Public disclosure.

====================================================================== 
7) Credits 

Discovered by Carsten Eiram, Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
candidate number CAN-2005-1939 for the vulnerability.

====================================================================== 
9) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2005-14/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================