Exploit Allaire JRun 2.3 - File Source Code Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20315
Проверка EDB
  1. Пройдено
Автор
FOUNDSTONE LABS
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
null
Дата публикации
2000-10-23
Код:
source: https://www.securityfocus.com/bid/1833/info

Allaire JRun is a web application development suite with JSP and Java Servlets. 

JRun contains a vulnerability that allows a user to access documents outside of the webroot. Requesting a malformed URL using the SSIFilter servlet, a remote user will gain read access to any file on a hosts filesystem. This is due to improper checking of where "../" paths lead (eg, outside of the webroot). In addition to disclosing the contents of arbitrary files, this vulnerability could allow a user to gain access to the source code of any file within the web document root of the web server.

Successful exploitation of this vulnerability will enable an attacker to read any file the webserver has access to, this information can lead to other compromises.

http://target/servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter/../../filename

http://target/servlet/ssifilter/../../filename
 
Источник
www.exploit-db.com

Похожие темы