lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 12 Feb 2004 14:10:58 -0500
From: Bill Stoddard <bill@...oddard.com>
To: Wang Yun <wangyun188@...mail.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: Apache Http Server Reveals Script Source Code to Remote Users
 And    Any Users Can Access The Forbidden Directory ("/WEB-INF/")


Wang Yun wrote:
> 
> TOPIC:
> ======
> Apache + Resin Reveals JSP Source Code to Remote Users And Any Users Can Access Resin Forbidden Directory ("/WEB-INF/")
> 
> Description:
> ============
> Security vulnerability has been found in Windows NT/2000 Systems that have Apache 1.3.29 + Resin 2.1.12 installed. The vulnerability allows remote users view script Source Code And Access files in the Forbidden Directory.
> 
> Exploits:
> =========
> http://apache/index.jsp%20
> It is possible to cause the Apache server to send back the content of index.jsp.
> 
> http://apache/WEB-INF../
> It is possible to cause the Apache server to send back the list of "/WEB-INF/" Directory.
> 
> Analyze:
> ========
> 1.Apache think "/WEB-INF../" unequal to "/WEB-INF/" So find this Directory by itself. 
> 2."/WEB-INF/" Directory not Forbidden in Apache Config files. 
> 3."d:\resin\doc\>cd WEB-INF.." legit in Windows Systems.
> 
> Sorry for my poor english.
> 
> lovehacker
> China

Don't put your jsp's under DocumentRoot. Same advice goes for CGI scripts, servlets, et. al.

Bill


Powered by blists - more mailing lists