Korean
<< Back
VID 22195
Severity 30
Port 80, ...
Protocol TCP
Class Servlet
Detailed Description The WebLogic Server has a source code disclosure vulnerability (3).
Certain versions of BEA Systems Weblogic server ship with a vulnerability which allows malicious users to view the source of .jsp and .jhtml pages which reside in the web document root directory, caused by a vulnerability in the SSIServlet (Server Side Include Servlet). A remote attacker could send a request for a known file prefixed with "/*.shtml/", which invokes the SSIServlet and causes the requested file's source code to be displayed.

* Refereces:
http://www.weblogic.com/docs51/admindocs/lockdown.html#1111303
http://www.foundstone.com/knowledge/randd-advisories-display.html?id=29
http://www.securityfocus.com/advisories/2459

* Platforms Affected:
BEA WebLogic Server and Express 4.5.x
BEA WebLogic Server and Express 5.1.x
BEA WebLogic Enterprise 5.1
Windows Any version
Linux Any version
Unix Any version
Recommendation Apply the patch for the "Show Code" vulnerability, as listed in BEA Systems, Inc. Security Advisory BEA02-03.03, http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA02-03.jsp

Once the patch has been applied, review the weblogic.properties file and ensure that the following changes have been made:

weblogic.httpd.register.file=weblogic.servlet.FileServlet weblogic.httpd.initArgs.file=defaultFilename=index.html weblogic.httpd.defaultServlet=file

should be changed to:

weblogic.httpd.register.*.html=weblogic.servlet.FileServlet weblogic.httpd.initArgs.*.html=defaultFilename=index.html weblogic.httpd.defaultServlet=*.html
Related URL CVE-2000-0683 (CVE)
Related URL 1517 (SecurityFocus)
Related URL 11746 (ISS)