You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@cocoon.apache.org by Viktors Rotanovs <Vi...@Rotanovs.com> on 2000/11/24 08:41:22 UTC
Fwd: RESIN ServletExec JSP Source Disclosure Vulnerability(IIS 5)
---------- Forwarded Message ----------
Subject: RESIN ServletExec JSP Source Disclosure Vulnerability(IIS 5)
Date: Thu, 23 Nov 2000 13:10:11 +0800
From: benjurry <be...@YEAH.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
Resintm serves the fastest servlets and JSP. With Java and JavaScript
support, Resin gives web applications the flexibility to choose the right
language for the task. Resin's leading XSL (XML stylesheet language) support
encourages separation of content from formatting.
Resin provides a fast
servlet runner for IIS and PWS, allowing IIS to run servlets and JSP files.
But On Resin1.2(maybe Resin1.1 also)(Win2k Simplify Chinese
version),ServletExec will return the source code of JSP files when you chage
the url to encode ASCII(That is to say,"%2e" instead of "."). For example,
the following URL will display the source of the specified JSP file:
http://benjurry/benjurry%2ejsp
Successful exploitation could lead to the disclosure of sensitive information
contained within JSP pages.
Solution:
I have reported this bug to the vendor,but they do nothing about it.
Benjurry
benjurry@263.net
2000.11.22
Share what I konw,Learn what I don't
-------------------------------------------------------