Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Servers :: web5324.htm

Bea Weblogic incorrect URL parsing issues



2nd May 2002 [SBWID-5324]
COMMAND

	Bea Weblogic incorrect URL parsing issues

SYSTEMS AFFECTED

	Tested on :
	

	 Bea Weblogic V6.1 Service Pack 2 on Windows 2000 Server

PROBLEM

	In Peter Gründl of KPMG Danemark advisory [BUG-ID: 2002016] :
	

	The  Bea  Weblogic  server  incorrectly  parses  certain  types  of  URL
	requests. This can result in the physical path being revealed, a  Denial
	of Service situation and revealing of .jsp sourcecode.
	

	 Physical webroot)

	

	By appending %00.jsp to a normal .html request, a compiler  error  would
	in some cases be  generated  that  would  print  out  the  path  to  the
	physical web root. A similar result can be achieved  by  prefixing  with
	%5c (backslash):
	

	 Denial of Service)

	

	This issue is very similar to  the  one  reported  in  KPMG-2002003,  in
	which we published that requesting a DOS device and  appending  .jsp  to
	the request would exhaust the working threads and cause the web  service
	to stop parsing HTTP and HTTPS requests.
	

	If a malicious user also added %00 in the request, it would still work.
	

	The server can handle about 10-11 working threads, so when  this  number
	of active threads has been reached, the server will  no  longer  service
	any requests. Since both HTTP and HTTPS are handled by the same  module,
	both are crippled if one is attacked.
	

	 Sourcecode revealed)

	

	There are a number of ways to manipulate the URL  in  a  way  that  will
	allow a malicious user to read the contents of a .jsp file. One  way  is
	to append \"%00x\" to the request, another could be  to  add  \"+.\"  to
	the request (exclamation marks excluded).

SOLUTION

	Get patch from :
	

	http://dev2dev.bea.com/resourcelibrary/advisoriesdetail.jsp?

	highlight=advisoriesnotifications&path=components/dev2dev/

	resourcelibrary/advisoriesnotifications/

	securityadvisoriesbea020303.htm

	


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH