TUCoPS :: Windows Apps :: a6097.htm

JWALK application server Directory Traversal Vulnerability
26th Mar 2003 [SBWID-6097]
COMMAND

	JWALK application server Directory Traversal Vulnerability

SYSTEMS AFFECTED

	JWALK application server version 3.2C9

PROBLEM

	In  advisory  by  Andy  Davis  of  Information   Risk   Management   Plc
	[http://www.irmplc.com/advisories] :
	
	--snip--
	
	Recently during a penetration test IRM  identified  a  serious  security
	vulnerability with the Jwalk application web server  version  3.2C9.  It
	appears  that  by  issuing   a   URL   containing   unicode   characters
	representing "../" directory traversal is possible.
	
	IRM used the following URL to obtain the Windows password  file  on  the
	machine in question:
	
	 HTTP://<IP_address>/.%252e/.%252e/.%252e/winnt/repair/sam._
	
	The server process appears to be running with sufficient  privileges  to
	read any file on the server (assuming the  name  and  location  of  this
	file is known).
	
	--snap--

SOLUTION

	Get JWalk, 3.3c4
	
	A workaround involves using different vendor's web server to  serve  the
	Jwalk application

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH