Vulnerability in Apache Tomcat v3.23 & v3.24 (part 2)

From: webmasterat_private
Date: Wed May 29 2002 - 06:32:29 PDT

  • Next message: webmasterat_private: "Gafware's CFXImage vulnerability"

    
     ('binary' encoding is not supported, stored as-is)
    Procheckup Ltd
    www.procheckup.com    
    
    Procheckup Security Bulletin PR02-06
    
    	   
      Description: Tomcat realPath.jsp gives location of web 
    root.
             Date: 8/1/2002
    
      Application: Apache Tomcat Java server versions 3.23 and 
    3.24
         Platform: Linux/Unix
         Severity: Remote attackers can obtain the location of 
    webroot
          Authors: Richard Brain [richard.brainat_private]
    Vendor Status:
    CVE Candidate: Not assigned
        Reference: www.procheckup.com
    
    
    Description:
    
    Tomcat is the free opensource  Java server, 
    http://jakarta.apache.org/tomcat/.
    
    A example program is provided with tomcat under the 
    http://webserver/test directory which gives the location of 
    the webroot.
    
    The test page of "http://webserver/test" displays the 
    following message :-
    "This is the home page of the test hierarchy. It doesn't do 
    too much good to look at it directly... Instead, why don't 
    you run the tests to find out what you might want to know.
    
    Oh, by the way, merry christmas.. :)"
    
    The vulnerabilities may only work on port 8080 rather than 
    port 80, dependant on how the webserver has been configured 
    with Tomcat.
    
    A) Requesting the following url :-
    http://webserver/test/realPath.jsp
    
    Displays the following:-
    The virtual path is /test/realPath.jsp
    
    The real path is "WEBROOT"/test/test/realPath.jsp
    
    The real path is "WEBROOT"/test/realPath.jsp
    
    
       Solution:
        Delete the realPath.jsp program.
    
     Legal:
      Copyright 2002 Procheckup Ltd. All rights reserved.
    
      Permission is granted for copying and circulating this 
    Bulletin
      to the Internet community for the purpose of alerting 
    them to problems
      , if and only if, the Bulletin is not edited or changed 
    in any way, 
      is attributed to Procheckup, and provided such 
    reproduction and/or
      distribution is performed for non-commercial purposes.
    
    
      Any other use of this information is prohibited. 
    Procheckup is not
      liable for any misuse of this information by any third 
    party.
    



    This archive was generated by hypermail 2b30 : Wed May 29 2002 - 14:01:31 PDT