Aptana Jaxer 安全漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1696433 漏洞类型 路径遍历
发布时间 2019-08-09 更新时间 2019-08-20
CVE编号 CVE-2019-14312 CNNVD-ID CNNVD-201908-598
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019080035
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201908-598
|漏洞详情
Aptana Jaxer是一款开源的JavaScript服务器。 Aptana Jaxer 1.0.3.4547版本中的wikilite源码浏览器存在本地文件包含漏洞。远程攻击者可借助tools/sourceViewer/index.html?filename=../ URI利用该漏洞读取内部文件。
|漏洞EXP
# Exploit Title: Aptana Jaxer Remote Local File inclusion
# Date: 8/8/2019
# Exploit Author: Steph Jensen
# Vendor Homepage:
[http://www.jaxer.org](http://www.jaxer.org/category/uncategorized/)
# Version: 1.0.3.4547
# Tested on: Linux
# CVE : CVE-2019-14312

Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via tools/sourceViewer/index.html?filename=../ URI.

To exploit this vulnerability an attacker must have access to the Aptana Jaxer web application. The Samples and Tools page will have the wikilite demo. After opening the wikilite demo the source code can be viewed by clicking the html button and selecting "Wikilite source code". This leads to http://server:8081/aptana/tools/sourceViewer/index.html?filename=../../samples/wikilite/index.html. by using directory traversal in the filename parameter a remote attacker can access internal files on the server.

PoC: http://server:8081/aptana/tools/sourceViewer/index.html?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
|参考资料

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/153985/Aptana-Jaxer-1.0.3.4547-Local-File-Inclusion.html


来源:www.exploit-db.com

链接:https://www.exploit-db.com/exploits/47214