[17750] in bugtraq

home help back first fref pref prev next nref lref last post

RESIN ServletExec JSP Source Disclosure Vulnerability(Apache

daemon@ATHENA.MIT.EDU (benjurry)
Thu Nov 23 18:11:53 2000

MIME-Version: 1.0
Content-Type: text/plain; charset="gb2312"
Message-ID:  <000701c0551d$c8dd1b00$3300a8c0@dudu>
Date:         Thu, 23 Nov 2000 13:11:38 +0800
Reply-To: benjurry <benjurry@www.YEAH.NET>
From: benjurry <benjurry@www.YEAH.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
Content-Transfer-Encoding: 8bit

Resintm serves the fastest servlets and JSP. With Java and JavaScript support, Resin gives web applications the flexibility to choose the right language for the task. Resin's leading XSL (XML stylesheet language) support encourages separation of content from formatting. 
Resin provides a fast servlet runner for Apache, allowing Apache to run servlets and JSP files. 

But On Resin1.2(maybe Resin1.1 also) with Win32(Win2k Simplify Chinese version)Apache ,ServletExec will return the source code of JSP files when a HTTP request is appended with one of the following characters:

".."
"%2e.."
"%81"
"%82"
........


"%fe"
For example, the following URL will display the source of the specified JSP file:

http://benjurry/benjurry.jsp..

http://benjurry/benjurry.jsp%81

Successful exploitation could lead to the disclosure of sensitive information contained within JSP pages.



Solution:

I have reported this bug to the vendor,but they do nothing about it.



Benjurry
benjurry@263.net
2000.11.22

Share what I konw,Learn what I don't



home help back first fref pref prev next nref lref last post