Blazix Java Application/Web Server JSP源码泄露漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1195612 漏洞类型 设计错误
发布时间 2006-03-28 更新时间 2006-03-30
CVE编号 CVE-2006-1483 CNNVD-ID CNNVD-200603-432
漏洞平台 N/A CVSS评分 5.0
|漏洞来源
https://cxsecurity.com/issue/WLB-2006030128
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200603-432
|漏洞详情
BlazixWebServer1.2.6之前版本,当运行于Windows上时,远程攻击者可通过以下途径获取JSP文件源代码:在URL扩展名中的(1)"."(点),(2)"空格",和(3)"斜杠"字符。
|漏洞EXP
======================================================================

Secunia Research 28/03/2006

- Blazix Web Server JSP Source Code Disclosure Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software

* Blazix Web Server version 1.2.5 on Windows.

Prior versions may also be affected.

====================================================================== 
2) Severity

Rating: Moderately Critical
Impact: Exposure of sensitive information
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Blazix, which can
be exploited by malicious people to disclose potentially sensitive
information.

The vulnerability is caused due to a validation error of the filename
extension supplied by the user in the URL. This can be exploited to
retrieve the source code of JSP files from the server via specially
crafted requests containing dot, space, and slash characters.

====================================================================== 
4) Solution

Update to version 1.2.6.

====================================================================== 
5) Time Table

22/03/2006 - Initial vendor notification.
22/03/2006 - Initial vendor reply.
28/03/2006 - Public disclosure.

====================================================================== 
6) Credits

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

No other references.

====================================================================== 
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-22/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================
|参考资料

来源:BID
名称:17270
链接:http://www.securityfocus.com/bid/17270
来源:BUGTRAQ
名称:20060328SecuniaResearch:BlazixWebServerJSPSourceCodeDisclosureVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/429108/100/0/threaded
来源:VUPEN
名称:ADV-2006-1133
链接:http://www.frsirt.com/english/advisories/2006/1133
来源:MISC
链接:http://secunia.com/secunia_research/2006-22/advisory/
来源:SECUNIA
名称:19341
链接:http://secunia.com/advisories/19341
来源:XF
名称:blazix-jsp-source-disclosure(25485)
链接:http://xforce.iss.net/xforce/xfdb/25485
来源:OSVDB
名称:24178
链接:http://www.osvdb.org/24178
来源:SECTRACK
名称:1015837
链接:http://securitytracker.com/id?1015837
来源:SREASON
名称:643
链接:http://securityreason.com/securityalert/643