SunJavaWebServer allows attackers to remotely execute arbitrary commands _ MySQL
Source: Internet
Author: User
Program involved: SolarisandWindowsNT description: SunJavaWebServer allows attackers to execute arbitrary commands remotely. Details: Sun's JavaWeb server has multiple security issues, allowing attackers to execute commands remotely with web server privileges. Its Web management module listens to port 9090 and uses http processing management commands. Com. sun. server:
Solaris and Windows NT
Description:
Sun Java Web Server allows attackers to execute arbitrary commands remotely
Details:
Sun's Java Web Server has multiple security issues, allowing attackers to remotely execute commands with web server privileges.
Its Web management module listens to port 9090 and uses http processing management commands.
"Com. sun. server. http. pagecompile. jsp92.JspServlet" servlet is used to compile and execute JSP files,
By adding the "/servlet/" prefix, remote users can use this servlet to compile and execute any JSP files in the Management Directory.
File.
By default, this server contains a message demonstration program that allows users to pass
Http://jws.site: 9090/examples/applications/bboard/bboard_frames.html
The documents are submitted and saved in board.html.
Attackers can input some JSP statements through the message board and then call
Use "com. sun. server. http. pagecompile. jsp92.JspServlet" to compile and execute the board.html file:
The http://jws.site: 9090/servlet/com. sun. server. http. pagecompile. jsp92.JspServlet/board.html
This causes attackers to remotely execute commands with web server privileges.
The following code is only used to test and study this vulnerability. if you use it for an improper approach, you are solely responsible for the consequences.
Use the following JSP code to print "Hello World ":
% String s = "Hello World"; %>
<% = S %>
Submit in message board:
Http://jws.site: 9090/examples/applications/bboard/bboard_frames.html
Then confirm that you have submitted through http://jws.site: 9090/board.html.
Compile and execute the code below:
Http://jws.site: 9090/servlet/com. sun. server. http. pagecompile
Solution:
Download and install the patch:
Http://java.sun.com/products/java-server/jws113patch3.html
Http://java.sun.com/products/java-server/jws20patch3.html
Additional information:
Saumil Shah (saumil.shah@foundstone.com)
Shreeraj Shah (shreeraj.shah@foundstone.com)
Stuart McClure (stuart.mcclure@foundstone.com)
Foundstone, Inc. (http://www.foundstone.com)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.