Korean
<< Back
VID 22174
Severity 30
Port 8000
Protocol TCP
Class Servlet
Detailed Description The Macromedia JRun has a source revealing vulnerability via a non-existent .shtml file.
Macromedia JRun is a web application development suite with JSP and Java Servlets. JRun supports Server Side Includes (SSI), SSI allows a webmaster to include various files in an otherwise static HTML file. Variables which might be included could be the current time on a website or last modified date and time etc. By default, file extension associated to the SSI handler is .shtml.

JRun versions 2.3.3, 3.0, and 3.1 contain a vulnerability that allows a remote attacker to obtain the source code of protected files within the Web root directory. Submitting a specially crafted request for a non-existent .shtml file along with a known file, will reveal the contents of the known file residing on the host. This issue results because of a flaw in a Server Side component which handles requests for SSI pages. Files which are interpreted as executable content (JSP scripts) will have their possibly sensitive source code output if requested using this vulnerability.
It is also possible for attackers to execute arbitrary Java servlets, regardless of whether the mapping has been disabled.

* References:
http://www.macromedia.com/v1/handlers/index.cfm?ID=22261&Method=Full
http://www.netcraft.com/security/public-advisories/2001-11.1.html
http://online.securityfocus.com/bid/3589
http://www.iss.net/security_center/static/7622.php

* Platforms Affected:
JRun 3.1 (all editions)
JRun 3.0 (all editions)
JRun 2.3.3 (all editions)
Recommendation Update to the latest version of the JRun from:
https://www.adobe.com/products/jrun/lownload/
Related URL CVE-2001-0926 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)