[Full-disclosure] JSPWiki Multiple Vulnerabilities
- From: Trancer <mtrancer@xxxxxxxxx>
- Date: Wed, 13 Feb 2008 22:54:04 +0200
_*JSPWiki Multiple Vulnerabilities*_
_*Janne Jalkanen JSPWiki – http://www.jspwiki.org <http://www.jspwiki.org/>*_
_*From JSPWiki website - “JSPWiki is a feature-rich and extensible WikiWiki engine built around a standart J2EE components (Java, servlets, JSP).”
/Earlier versions may also be affected.
JSPWiki Local .jsp File Inclusion Vulnerability
_*An input validation problem exists within JSPWiki which allows to execute (include) arbitrary local .jsp files. An attacker may leverage this issue to execute arbitrary server-side script code on a vulnerable server with the privileges of the web server process.
/Example (including //rss.jsp// file from the application root directory):/
/Note: //page// parameter must be an existing page on the server./
This grants an attacker unauthorized access to sensitive .jsp files on the server and can lead to information disclosure.
The first example disclose sensitive information such as the full path of the application on the server, page (and attachments) storage path, log files and work directory by including the application installation (Install.jsp).
The second example disclose the application security configurations by including the JSPWiki Security Configuration Verifier file (admin/SecurityConfig.jsp).
In addition, JSPWiki allow users to upload (attach) files to entry pages. An attacker can use the information disclosed by the installation file to upload a malicious .jsp file and locally execute it.
_By executing malicious server-side code, an attacker may be able to compromise the server._
*_JSPWiki Cross-Site Scripting Vulnerability
_*An attacker may leverage cross-site scripting vulnerability to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
BugSec LTD. - Security Consulting Company
Email: Info -at- BugSec -d0t- com
Moshe :: Trancer
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Prev by Date: [Full-disclosure] Pouring one out for my homie the Dude
- Next by Date: [Full-disclosure] [ GLSA 200802-07 ] Pulseaudio: Privilege escalation
- Previous by thread: [Full-disclosure] Pouring one out for my homie the Dude
- Next by thread: [Full-disclosure] [ GLSA 200802-07 ] Pulseaudio: Privilege escalation