| VID |
22071 |
| Severity |
30 |
| Port |
8000, ... |
| Protocol |
TCP |
| Class |
Servlet |
| Detailed Description |
The Allaire JRun server allows an attacker to view arbitrary files by issuing a malformed request to the SSIFilter. JRun is used to develop Web applications with JSP and Java Servlets. Allaire JRun version 2.3x fails to properly check for "dot dot" (../) sequences in URLs. By using the JRun server's SSIFilter, a remote attacker can send a specially-crafted URL that contains "dot dot" (../) sequences to traverse directories and access any file on the server. An attacker could also use this to access the source code of arbitrary files in the server's document root. Potentially proprietary Web server files (such as Java Server Pages) may contain sensitive information (such as user IDs and passwords) embedded in the source code. |
| Recommendation |
Upgrade to the latest Jrun at https://www.adobe.com/products/jrun/download/ |
| Related URL |
CVE-2000-1051,CVE-2000-1052 (CVE) |
| Related URL |
1833 (SecurityFocus) |
| Related URL |
5405 (ISS) |
|