Korean
<< Back
VID 22071
Severity 30
Port 8000, ...
Protocol TCP
Class Servlet
Detailed Description The Allaire JRun server allows an attacker to view arbitrary files by issuing a malformed request to the SSIFilter. JRun is used to develop Web applications with JSP and Java Servlets.
Allaire JRun version 2.3x fails to properly check for "dot dot" (../) sequences in URLs. By using the JRun server's SSIFilter, a remote attacker can send a specially-crafted URL that contains "dot dot" (../) sequences to traverse directories and access any file on the server. An attacker could also use this to access the source code of arbitrary files in the server's document root. Potentially proprietary Web server files (such as Java Server Pages) may contain sensitive information (such as user IDs and passwords) embedded in the source code.
Recommendation Upgrade to the latest Jrun at
https://www.adobe.com/products/jrun/download/
Related URL CVE-2000-1051,CVE-2000-1052 (CVE)
Related URL 1833 (SecurityFocus)
Related URL 5405 (ISS)