TUCoPS :: Web :: Servers :: wsphere1.htm

IBM Websphere Show Code vulnerability
Vulnerability

    WebSphere Application Server

Affected

    IBM WebSphere Application Server (all version up to and including 3.0.2)

Description

    Following is based on Foundstone Security Advisory by Saumil  Shah
    and Stuart McClure.  A  show code vulnerability exists with  IBM's
    WebSphere Application Server for  NT allowing an attacker  to view
    the source code of Java Server Pages (JSP) files.

    The  problem  lies  with  the  way  WebSphere  assigns handlers to
    specific file types.  For example, files with the extensions  .jsp
    are registered as Java Server Pages by WebSphere.

    WebSphere being case sensitive, interprets .jsp and .JSP to be two
    extensions.  If a request for a .JSP file is made to WebSphere, it
    cannot find  a handler  for the  .JSP extension  and therefore, it
    uses the  default handler,  which is  of type  "text".   Since the
    underlying file system  is Windows NT,  it does not  differentiate
    between  upper  case  and  lower  case  filenames,  and  hence the
    requested  file  ends  up  being  served  up as plain text without
    being  parsed  or  interpreted.   On  WebSphere  running  on  Unix
    servers, it flags a "File not Found" error.

    Normally,  JSP  files  are  referred  to  in URLs using lower case
    extensions.  For example:

        http://site.running.websphere/index.jsp

    By changing  any letters  in the  extension (.jsp)  to upper case,
    it is possible to obtain the unparsed source code of the JSP file.
    For  the  above  example,  the  exploit  would  be  to  access the
    following URL:

        http://site.running.websphere/index.JSP

Solution

    An efix (APAR #: PQ38936) is available and will be posted at:

        http://www-4.ibm.com/software/webservers/appserv/efix.html

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH