Exploit Caucho Technology Resin 1.2/1.3 - JavaBean Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20722
Проверка EDB
  1. Пройдено
Автор
LOVEHACKER
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
cve-2001-0399
Дата публикации
2001-04-03
Код:
source: https://www.securityfocus.com/bid/2533/info

A specially constructed HTTP request could enable a remote attacker to gain read access to any known JavaBean file residing on a host running Resin.

On Resin webservers, JavaBean files reside in a protected directory, '/WEB-INF/classes/'. Unfortunately, this protection can be bypassed due to an input validation bug in the Resin webserver. If an attacker inserts the substring '.jsp' before the path of the JavaBean in the request, the webserver will incorrectly interpret the request and serve the contents of the requested JavaBean to the client.

An attacker exploiting this may be able to gain sensitive information contained in the JavaBeans. 

http://target/.jsp/WEB-INF/classes/filename
 
Источник
www.exploit-db.com

Похожие темы