---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: webMethods Glue "resource" Directory Traversal Vulnerability SECUNIA ADVISORY ID: SA24933 VERIFY ADVISORY: http://secunia.com/advisories/24933/ CRITICAL: Moderately critical IMPACT: Exposure of system information, Exposure of sensitive information WHERE: >From remote SOFTWARE: webMethods Glue 6.x http://secunia.com/product/13974/ webMethods Glue 5.x http://secunia.com/product/13976/ webMethods Glue 4.x http://secunia.com/product/13975/ DESCRIPTION: Patrick Webster has reported a vulnerability in webMethods Glue, which can be exploited by malicious people to disclose sensitive information. Input passed to the "resource" parameter via the /console URL is not properly sanitised before being used to display files. This can be exploited to display arbitrary files via directory traversal attacks. The vulnerability reportedly affects versions 4.x, 5.x, and 6.x. SOLUTION: The vendor recommends editing various configuration files, blocking access to the /console URL, or running the server in "chroot" environment. Please see the vendor's advisory for details. A fix for version 6.5.1 will reportedly be made available by May 1. For other versions, contact webMethods Technical Services. PROVIDED AND/OR DISCOVERED BY: Patrick Webster ORIGINAL ADVISORY: Security Alerts forum in webMethods (requires registration): https://advantage.webmethods.com/ http://www.aushack.com/advisories/200704-webmethods.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------