Korean
<< Back
VID 22168
Severity 20
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Oracle9iAS server has the revealing vulnerability of the physical path of file via a non-existent .jsp file.
Oracle's Oracle9iAS server comes with an Apache-based web server and Java servlet engine for the HTTP server. Some versions of Oracle9iAS allow a remote attacker to gain the physical path of file on the web server. This vulnerability arises when a remote attacker requests a non-existent file with the extension .jsp as the following URL:

http://target_server/non_existent_file.jsp

The server will return the error page, contains the physical path of file on the web server as the following:

JSP Error:
Request URI:/non_existent_file.jsp
Exception:
javax.servlet.ServletException: java.io.FileNotFoundException: /usr/local/oracle_home/Apache/Apache/htdocs/non_existent_file.jsp (No such file or directory)

Using this vulnerability, a remote attacker can gain sensitive information about a target server's file system and use it to perform the further attack.

* Platforms Affected :
Oracle9i Application Server 1.0.0
Oracle9i Application Server 1.0.1
Oracle9i Application Server 1.0.2

* References:
http://online.securityfocus.com/bid/3341
http://www.iss.net/security_center/static/7135.php
Recommendation Upgrade to the OJSP 1.1.2.0.0 from the oracle's web site: http://otn.oracle.com/software/tech/java/servlets/content.html

As the workaround, ensure that the virtual path in a URL is different from the actual directory path when using Oracle Apache/JServ. Also, don't use the <servletzonepath> directory in "ApJServMount <servletzonepath> <servletzone>" to store data or files.
Related URL CVE-2001-1372 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)