| VID |
22236 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
Servlet |
| Detailed Description |
Resin 'view_source.jsp' sample script has a directory traversal vulnerability. Resin, developed by Caucho Technology, is a servlet and Java Server Pages (JSP) engine that supports Java and JavaScript. The 'view_source.jsp' sample script in Resin version 2.1.2 under a Microsoft Windows platform could allow a remote attacker to view contents of arbitrary files on the Web server. The 'view_source.jsp' script prevents directory traversal via '/../' sequences. However, an attacker attempting directory traversal via '\..\' sequences will succeed. This may allow an attacker to request any files on the vulnerable system readable by the Web server.
* References: http://archives.neohapsis.com/archives/bugtraq/2002-06/0168.html
* Platforms Affected: Resin 2.1.2 Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of Resin (2.1.11 or later), available from the Caucho Technology Web site at http://caucho.com/products/resin/download
-- OR --
As a workaround, remove the "Examples" folder, if the sample scripts are not needed. |
| Related URL |
CVE-2002-1987 (CVE) |
| Related URL |
5031 (SecurityFocus) |
| Related URL |
9351 (ISS) |
|