Korean
<< Back
VID 21289
Severity 30
Port 80, ...
Protocol TCP
Class Servlet
Detailed Description The Apache Tomcat server distributed with Netware 6.0 has a directory traversal vulnerability.
Apache Tomcat is a Java application server used with Apache HTTP Server to support JavaServer Pages (JSP) and Java servlets. The '/examples/jsp/source.jsp' sample script in the Apache Tomcat server distributed with Netware 6.0 could allow a remote attacker to view contents of arbitrary files on the Web server.
The 'source.jsp' script prevents directory traversal via '/../' sequences. However, an attacker attempting directory traversal via '/%2e%2e/' sequences with Unicode characters will succeed. This may allow an attacker to request any files on the vulnerable system readable by the Web server. To exploit this vulnerability, a remote attacker will send a "source.jsp" request containing "dot dot" sequences (/%2e%2e/) for a known file, it could allow the attacker to obtain sensitive information from the Netware server, such as the RCONSOLE password located in AUTOEXEC.NCF.

http://[targetserver]/examples/jsp/source.jsp?%2e%2e/%2e%2e/%2e%2e/%2e%2e/system/autoexec.ncf

* Platforms Affected:
Apache Software Foundation Tomcat Any version
Netware 6.0
Recommendation Remove default sample files located in "/examples/" virtual directory from the affected Web server. Also, ensure the RCONSOLE password is encrypted and utilize a password protected screensaver for console access.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)