Re: def-2001-32 - Allaire JRun directory browsing vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




In-Reply-To: <PKEMKDGKMFGJMOHGPHFPAEBJCAAA.george.hedfors@defcom.com>

Here are some HTTP header dumps from different 
web servers that are vulnerable to the \%3f.jsp 
directory content vulnerability

HTTP/1.0 200 OK
Date: Fri, 30 Nov 2001 03:43:27 GMT
Server: Jetty/3.1.RC8 (Linux 2.2.16-22enterprise x86)
Servlet-Engine: Jetty/3.1 (JSP 1.1; Servlet 2.2; java 
1.3.0)


HTTP/1.1 200 OK
Date: Fri, 30 Nov 2001 04:00:20 GMT
Server: Apache/1.3.20 (Linux/SuSE) mod_jk
Last-Modified: Thu, 01 Nov 2001 21:20:47 GMT

HTTP/1.1 302 Found
Date: Fri, 30 Nov 2001 04:03:07 GMT
Server: Apache/1.3.14 (Unix) PHP/4.0.6 
ApacheJServ/1.1.2
Servlet-Engine: Tomcat Web Server/3.2.3 (JSP 1.1; 
Servlet 2.2; Java 1.
 5.8 sparc; java.vendor=Sun Microsystems Inc.)

mad love to securityfocus.com....

-slow2show-
University of Florida

>Received: (qmail 16045 invoked from network); 29 
Nov 2001 23:59:04 -0000
>Received: from outgoing3.securityfocus.com 
(HELO outgoing.securityfocus.com) (66.38.151.27)
>  by mail.securityfocus.com with SMTP; 29 Nov 
2001 23:59:04 -0000
>Received: from lists.securityfocus.com 
(lists.securityfocus.com [66.38.151.19])
>	by outgoing.securityfocus.com (Postfix) 
with QMQP
>	id 8AADDA3397; Thu, 29 Nov 2001 
11:10:59 -0700 (MST)
>Mailing-List: contact bugtraq-
help@securityfocus.com; run by ezmlm
>Precedence: bulk
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@securityfocus.com>
>List-Help: <mailto:bugtraq-
help@securityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-
unsubscribe@securityfocus.com>
>List-Subscribe: <mailto:bugtraq-
subscribe@securityfocus.com>
>Delivered-To: mailing list 
bugtraq@securityfocus.com
>Delivered-To: moderator for 
bugtraq@securityfocus.com
>Received: (qmail 18871 invoked from network); 29 
Nov 2001 11:03:11 -0000
>From: "George Hedfors" 
<george.hedfors@defcom.com>
>To: "Felix Huber" <huberfelix@webtopia.de>,
>	"BugTraq" <bugtraq@securityfocus.com>
>Subject: RE: def-2001-32 - Allaire JRun directory 
browsing vulnerability
>Date: Thu, 29 Nov 2001 12:03:57 +0100
>Message-ID: 
<PKEMKDGKMFGJMOHGPHFPAEBJCAAA.george.h
edfors@defcom.com>
>MIME-Version: 1.0
>Content-Type: text/plain;
>	charset="iso-8859-1"
>Content-Transfer-Encoding: 7bit
>X-Priority: 3 (Normal)
>X-MSMail-Priority: Normal
>X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 
(9.0.2910.0)
>X-MimeOLE: Produced By Microsoft MimeOLE 
V5.50.4807.1700
>Importance: Normal
>In-Reply-To: <020401c178c4$3b322630
$0205a8c0@athlon>
>
>That Apache must be running some JRun engine, 
could you find out wich?
>
>Regards, George
>
>-----Original Message-----
>From: Felix Huber [mailto:huberfelix@webtopia.de]
>Sent: den 29 november 2001 11:55
>To: George Hedfors; bugtraq@securityfocus.com
>Subject: Re: def-2001-32 - Allaire JRun directory 
browsing vulnerability
>
>
>> ------------------------=[Affected Systems]=-------------
-------------
>> Under Windows NT/2000(any service pack) and 
IIS 4.0/5.0:
>> - JRun 3.0 (all editions)
>> - JRun 3.1 (all editions)
>> ----------------------=[Detailed Description]=------------
------------
>> Upon sending a specially formed request to the 
web server, containing
>> a '.jsp' extension makes the JRun handle the 
request. Example:
>>
>> http://www.victim.com/%3f.jsp
>
>Not only IIS is affected, i found a vulnerable Site 
running Apache 1.3.19 on
>Solaris.
>
>A NASL Script is attached to find affected systems.
>
>
>MfG
>Felix Huber
>
>
>-------------------------------------------------------
>Felix Huber, Security Consultant, Webtopia
>Guendlinger Str.2, 79241 Ihringen - Germany
>huberfelix@webtopia.de     (07668)  951 156 (phone)
>http://www.webtopia.de     (07668)  951 157 (fax)
>                                         (01792)  205 724 (mobile)
>-------------------------------------------------------
>
>
>
>
>


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux