TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: All
from: Geo.
date: 2004-06-09 05:49:30
subject: Crystal Reports

From: "Geo." 

I use CR all the time to do reports for the ISP. Well I forget what version
it was but all of a sudden they stuck this web frontend on CR and when I
saw that I just shook my head thinking why compromise the machine with that
nightmare and immediately went to special install to make sure that part
didn't install on my machine (if I'm remembering right it installs by
default).

Well the results are in...

ID: 6749
TITLE: Microsoft Crystal Reports Web Viewer Arbitrary File Access
DISCLOSURE DATE: June  8, 2004
DESCRIPTION: Microsoft Crystal Reports Web Viewer contains a flaw that
allows a remote attacker to view or delete files outside of the web path.
The issue is due to the program not properly sanitizing user input,
specifically traversal style attacks (../../).  Systems are only vulnerable
if they have an IIS server installed. URL: http://www.osvdb.org/6749

ID: 6747
TITLE: Crystal Reports/Enterprise Disk Space Exhaustion DoS DISCLOSURE
DATE: June  8, 2004
DESCRIPTION: Crystal Reports and Crystal Enterprise contain a flaw that may
allow a remote denial of service.  The issue is triggered when a remote
user repeatedly accesses the crystalimagehandler.aspx script and requests
image creation, and will result in loss of availability for the server by
exhausting disk space and slowing connections. URL:
http://www.osvdb.org/6747

ID: 6748
TITLE: Crystal Reports/Enterprise Arbitrary File Manipulation DISCLOSURE
DATE: June  8, 2004
DESCRIPTION: Crystal Reports and Crystal Enterprise contain a flaw that
allows a remote attacker to access or delete files outside of the web path.
The issue is due to the crystalimagehandler.aspx script not properly
sanitizing user input, specifically traversal style attacks (../../)
supplied via the "dynamicimage" variable. URL:
http://www.osvdb.org/6748

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.