Korean
<< Back
VID 22161
Severity 30
Port 8080
Protocol TCP
Class Servlet
Detailed Description The Apache Tomcat server has a JSP source revealing vulnerability via a double encoding URL request.
Apache Tomcat is a Java application server used with Apache HTTP Server to support JavaServer Pages (JSP) and Java servlets. Jakarta Tomcat versions 4.0-b2 and earlier are vulnerable to source code exposure by using simple URL encoding. A remote attacker can send a specially-crafted URL request for a known JavaServer Pages (JSP) to bypass protection and obtain the source code of the requested JSP page, and possibly obtain database passwords and file names.
You can test this flaw by issuing the URL request like the following using your web browser:

http://example.com:8080/index.js%2570

Where %25 is an URL encoded '%', and 70 is the hexadecimal value for 'p', returns the source code of index.jsp rather than running the script on the server side.

* Platforms Affected:
Tomcat 4.0-b2 and earlier
UNIX/Linux Any version
Windows Any version

* References:
http://online.securityfocus.com/bid/2527
http://www.iss.net/security_center/static/6316.php
http://www.securiteam.com/unixfocus/5RP0F0U4KA.html
Recommendation Upgrade to the latest release of Jakarta Tomcat (4.0 Beta3 or later), available from the Jakarta Web site, http://jakarta.apache.org/builds/jakarta-tomcat-4.0/release/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)