Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Servers :: wlogic8.htm

BEA WebLogic 5.1.0 SP 6, and probably earlier versions show code vulnerability



Vulnerability

    WebLogic

Affected

    BEA WebLogic 5.1.0 SP 6, and probably earlier versions

Description

    Sverre H. Huseby found following.   The reported problem seems  to
    have been fixed in recent versions, without Sverre talking to BEA.
    This  may  indicate  that  other  people have reported the problem
    before him.  It may also mean that the problem is related to other
    URL parsing errors in WebLogic, such as the one reported  recently
    by Peter Grundl.

    BEA WebLogic may be tricked into revealing the source code of  JSP
    scripts by using simple URL encoding of characters in the filename
    extension.   It seems  that the  built in  web server  in WebLogic
    does  URL  decoding  in  an  unreasonable  order.   URLs  like the
    following:

        http://XXX/index.js%70

    where  %70  is  an  URL  encoded  'p',  returns the source code of
    index.jsp rather than running the script on the server side.

    To speculate (read: guess): The JSP handler is skipped as this URL
    does  not  end  in  ".jsp",   but  the  static  file  handler   is
    nevertheless able to map the URL into a correct file name.

    This design error  makes it possible  to fetch the  source code of
    JSP scripts.  Such source code may contain database passwords  and
    file names, and may reveal design errors or programming bugs  that
    make it possible to further exploit the server or service.

Solution

    The problem seems to be gone in 5.1.0 SP 8.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH