AOH :: HP Unsorted W :: TB10344.HTM

webMethods Glue Management Console Directory Traversal
webMethods Glue Management Console Directory Traversal
webMethods Glue Management Console Directory Traversal - Vulnerability Advisory
Release Date:

 webMethods - webMethods Glue Management Console 

 "With webMethods Glue developers can easily create SOAP interfaces
  for their existing Java and C/C++ applications, and legacy systems
  can be easily Web service-enabled, allowing reuse. webMethods Glue
  includes a compact, high-performance implementation of important
  standards such as HTTP, Servlets, XML, SOAP, WSDL, and UDDI, and
  interoperates with Microsoft .NET, IBM WebSphere, BEA WebLogic,
  Apache Axis, and other Web service platforms."

Versions affected:
 Glue 6.5.1 and below.

Vulnerability discovered:

 Directory Traversal.

Vulnerability impact:

 Medium - Read arbitrary system files.

Vulnerability information:

 The webMethods Glue Management Console includes HTML pages via
 the /console?resource=console/index.html variable, which is prone
 to a classic traversal attack.



  Would return the contents of the 'boot.ini' file.

  Note that 'c:\boot.ini' is also valid. It may be possible
  (but untested) to traverse other volumes.

References: advisory 

Patrick Webster ( ) 

Disclosure timeline:
 20-Mar-2007 - Discovered during quick audit.
 23-Mar-2007 - Vendor notified. No response.
 11-Apr-2007 - Public disclosure.


The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH
We do not send spam. If you have received spam bearing an email address, please forward it with full headers to