header-logo
Suggest Exploit
vendor:
WinGate
by:
Blue Panda
7.5
CVSS
HIGH
File Disclosure Vulnerability
200
CWE
Product Name: WinGate
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: NT and Win9x
2000

WinGate Log Service File Disclosure Vulnerability

The WinGate log service is configured by default to only allow connections from 127.0.0.1, but can be set to allow connections from anywhere. Either way, there is a vulnerability that will allow any file to be read through the log service port over an http connection. There are various ways of exploiting this. NT and Win9x: h t t p://www.server.com:8010/c:/ h t t p://www.server.com:8010// Win9x only: h t t p://www.server.com:8010/..../

Mitigation:

Restrict access to the WinGate log service to trusted IP addresses.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/507/info


The WinGate log service is configured by default to only allow connections from 127.0.0.1, but can be set to allow connections from anywhere. Either way, there is a vulnerability that will allow any file to be read through the log service port over an http connection.

Update (October 16, 2000):

Blue Panda <bluepanda@dwarf.box.sk> has discovered that a variation of the vulnerability exists in recent versions. Using escaped characters, one can achieve the same effect. 

There are various ways of exploiting this.
NT and Win9x:
h t t p://www.server.com:8010/c:/
h t t p://www.server.com:8010//
Win9x only:
h t t p://www.server.com:8010/..../