TUCoPS :: Web :: Apps :: jrun4.htm

JRun access to sensitive directories
Vulnerability

    JRun

Affected

    JRun 3.0

Description

    Following is based on  a Foundstone Security Advisory  by Shreeraj
    Shah, Saumil  Shah and  Stuart McClure.   A severe  security  flaw
    exists  with  Allaire's  JRun  3.0  allowing an attacker to access
    WEB-INF directories on the JRun 3.0 server.  The WEB-INF directory
    tree  contains  web  application  classes, pre-compiled JSP files,
    server  side  libraries,  session  information  and  files such as
    web.xml and webapp.properties.

    JRun 3.0 can be  made to run as  a stand-alone web server  on port
    8100.   The  directory  <jrun_install_dir>/servers/default   holds
    different web applications hosted in it.

    The  directory  <jrun_install_dir>/servers/default/default-app  is
    the  web  document  root  for  the  default web application.  This
    application  is  mapped   to  http://site.running.jrun:8100/,   if
    accesed via a web browser.

    Other web application directories are  set up in a similar  manner
    as follows:

        <jrun_install_dir>/servers/default/app1
        <jrun_install_dir>/servers/default/app2 ... etc.

    Their URLs would be mapped as:

        http://site.running.jrun:8100/app1,
        http://site.running.jrun:8100/app2,...

    and so on, depending on the configuration.

    Each web application directory  contains a WEB-INF directory  tree
    which  contains  configuration  files,  server  side   components,
    libraries  and  other   application  related  information.    This
    directory is not visible to the client.  If the WEB-INF  directory
    is requested by a web browser by the following URL:

        http://site.running.jrun:8100/WEB-INF/

    the server responds with a  403 Forbidden error code.   However it
    is possible to access this directory via the following URL:

        http://site.running.jrun:8100//WEB-INF/

    This  causes  the  entire  directory  tree  under  WEB-INF  to  be
    displayed  and  eventually  files  under  this  directory  can  be
    accessed.  For example:

        http://site.running.jrun:8100//WEB-INF/web.xml
        http://site.running.jrun:8100//WEB-INF/webapp.properties

    would   allow   remote   attackers   to   view   the  web.xml  and
    webapp.properties in  the WEB-INF  directory.   Attackers can also
    access   critical   resources   such   as   class  files,  session
    information, etc.

    Prefixing the path to WEB-INF by / in the URL causes the directory
    structure within WEB-INF to be displayed:

        http://site.running.jrun:8100//WEB-INF/

Solution

    Follow  the  recommendations  given  in  Allaire Security Bulletin
    ASB00-27.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH