Korean
<< Back
VID 22085
Severity 40
Port 8000, ...
Protocol TCP
Class Servlet
Detailed Description The JRun web server allows anyone to bypass the authentication for the admin console.
Macromedia JRun is a servlet/JSP engine used for developing and deploying Java applications. It installs an web based administration console on TCP port 8000. Before the console can be used by users, they are required to login via an HTML form. However, By adding an extra '/' to a request for the administrative authentication page, we can bypass the login page and gain access to the web based admin console, e.g. http://JRun-Server//. It allows a remote attacker to access administrative functions without proper authentication.
By requesting the desired admin function in the initial URL we can bypass this restriction also, e.g.:
http://JRun-Server:8100//welcome.jsp?&action=stop&server=default

Will shutdown the 'default' JRun server instance on port 8100. Other administrative functions can also be accessed.

* Refereces:
http://www.securiteam.com/securitynews/5NP040A7PW.html
http://www.westpoint.ltd.uk/advisories/wp-02-0009.txt
http://online.securityfocus.com/bid/5118
http://www.iss.net/security_center/static/9450.php

* Platforms Affected:
Macromedia JRun 3.0
Macromedia JRun 3.1
Macromedia JRun 4.0
Recommendation Upgrade to the latest JRun at
https://www.adobe.com/products/jrun/download/
Related URL CVE-2002-0665 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)