[UNIX] InfronTech WebTide Directory and File Disclosure Vulnerability (%3F.JSP)

From: SecuriTeam (support_at_securiteam.com)
Date: 10/28/03

  • Next message: SecuriTeam: "[EXPL] Musicqueue Multiple Local Vulnerabilities (/tmp/musicqueue.crash Symblink, Language Overflow)"
    To: list@securiteam.com
    Date: 28 Oct 2003 16:08:41 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      InfronTech WebTide Directory and File Disclosure Vulnerability (%3F.JSP)
    ------------------------------------------------------------------------

    SUMMARY

    InfronTech's J2EE Web Application Server,
    <http://www.infrontech.com/product/product_main_w01.jsp> WebTide, is a
    localized product of PowerTier 7.0 developed by Persistence Software. The
    WebTide has a vulnerability that allows remote attackers to disclose
    directories' and files' content by sending the server a special HTTP
    request.

    DETAILS

    Vulnerable systems:
     * InfronTech WebTide version 7.04

    Immune systems:
     * InfronTech WebTide version 7.05

    By requesting a URL such as:
    http://www.example.com/%3f.jsp

    It is possible to cause the WebTide server to return the content of the
    directory instead of displaying the default HTML file. The same goes for
    JSP files, instead of running them, their source code will be disclosed.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:advisory@stgsecurity.com>
    SSR Team.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[EXPL] Musicqueue Multiple Local Vulnerabilities (/tmp/musicqueue.crash Symblink, Language Overflow)"

    Relevant Pages

    • [NT] SMSGate Denial of Service
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A vulnerability in the way SMSGate handles incoming HTTP ... When a too big HTTP Content-Length value is received, the server tries to ...
      (Securiteam)
    • [NEWS] SCI Photo Chat Server Cross Site Scripting
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... chat server that supports multimedia pictures, sounds, or even videos. ...
      (Securiteam)
    • [UNIX] PrimeBase SQL Database Server Clear Text Password Storage
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The PrimeBase SQL Database Server stores ... Administrator password during installation. ...
      (Securiteam)
    • [NT] Directory Traversal Exploit in SD Server
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... SD Server is very easy to install, ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [UNIX] Opt-X File Inclusion Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... malicious script that is hosted on an attacker-controlled server. ... There's a file inclusion vulnerability in the /includes/header.php file, ...
      (Securiteam)