Procheckup Ltd www.procheckup.com Procheckup Security Bulletin PR02-06 Description: Tomcat realPath.jsp gives location of web root. Date: 8/1/2002 Application: Apache Tomcat Java server versions 3.23 and 3.24 Platform: Linux/Unix Severity: Remote attackers can obtain the location of webroot Authors: Richard Brain [richard.brain@procheckup.com] Vendor Status: CVE Candidate: Not assigned Reference: www.procheckup.com Description: Tomcat is the free opensource Java server, http://jakarta.apache.org/tomcat/. A example program is provided with tomcat under the http://webserver/test directory which gives the location of the webroot. The test page of "http://webserver/test" displays the following message :- "This is the home page of the test hierarchy. It doesn't do too much good to look at it directly... Instead, why don't you run the tests to find out what you might want to know. Oh, by the way, merry christmas.. :)" The vulnerabilities may only work on port 8080 rather than port 80, dependant on how the webserver has been configured with Tomcat. A) Requesting the following url :- http://webserver/test/realPath.jsp Displays the following:- The virtual path is /test/realPath.jsp The real path is "WEBROOT"/test/test/realPath.jsp The real path is "WEBROOT"/test/realPath.jsp Solution: Delete the realPath.jsp program. Legal: Copyright 2002 Procheckup Ltd. All rights reserved. Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems , if and only if, the Bulletin is not edited or changed in any way, is attributed to Procheckup, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. Procheckup is not liable for any misuse of this information by any third party.