Korean
<< Back
VID 22025
Severity 40
Port 80, ...
Protocol TCP
Class Servlet
Detailed Description The Oracle JSP/SQLJS Servlet allows viewing files and executing JSP outside the web root.
Directory traversal vulnerability in Oracle JSP 1.0.x through 1.1.1 and Oracle 8.1.7 iAS Release 1.0.2 can allow a remote attacker to view arbitrary files outside the web root, and also to execute arbitrary .JSP files on the same partiotion as the web server's root.

For examples:
1) The following URL:
http://oraclehost/a.jsp//..//..//..//..//..//../winnt/win.ini
shall read c:\winnt\win.ini. It is normal to receive an error to this request. To see the result go to: http://oraclehost/_pages/ and look in the directories for .java files containing "win".

2) The following URL:
http://oraclehost/servlet//..//../o.jsp
will execute c:\o.jsp if there is such file. As a side effect this shall create the directory C:\servlet\_pages\_servlet and shall put in it the java source and .class file of o.jsp.

* Note that this scanner solely relied on the banner of the remote Apache web server to assess this vulnerability.

* References:
http://www.securityfocus.com/bid/2286
http://www.guninski.com/orajsp.html
Recommendation Upgrade to OJSP Release 1.1.2.0.0, available on Oracle Technology Network's OJSP web site:
http://otn.oracle.com/software/tech/java/servlets/htdocs/listing.htm
Related URL CVE-2001-0591 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)