Apache Software Foundation Tomcat Servlet读取任意'jsp'文件的源代码漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1106276 漏洞类型 未知
发布时间 2001-03-28 更新时间 2006-04-07
CVE编号 CVE-2001-0590 CNNVD-ID CNNVD-200108-021
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20716
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200108-021
|漏洞详情
ApacheSoftwareFoundationTomcatServlet3.2.2之前的版本存在漏洞。远程攻击者借助畸形的URL请求读取任意'jsp'文件的源代码,该URL请求不以HTTP协议规范(i.e.HTTP/1.0)结束。
|漏洞EXP
source: http://www.securityfocus.com/bid/2518/info

Apache Tomcat in a Windows NT environment could be led to traverse the normal directory structure and return requested files from outside of the document root.

By including '/../' sequences along with specially chosen characters in requested URLs, a remote user can obtain read access to directories and files outside of the document root, potentially compromising the privacy of user data and/or obtaining information which could be used to further compromise the host. 

The following examples have been provided by lovehacker <lovehacker@263.net>:

http://www.example.com/../../winnt/win.ini%00examples/jsp/hello.jsp

Will cause the Tomcat server to send back the content of win.ini.

http://www.example.com/%2e%2e/%2e%2e/%00.jsp

will disclose a directory listing from outside Tomcat's normal directory tree.

http://www.example.com/%2e%2e/%2e%2e%5cfilename%00.jsp

will reveal the requested file [filename].
|参考资料

来源:BUGTRAQ
名称:20010403Re:TomcatmayrevealscriptsourcecodebyURLtrickery
链接:http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html
来源:XF
名称:jakarta-tomcat-jsp-source(6971)
链接:http://xforce.iss.net/static/6971.php
来源:HP
名称:HPSBTL0112-004
链接:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0112-004
来源:OSVDB
名称:5580
链接:http://www.osvdb.org/5580