Some vulnerabilities and a security issue have been reported in Sun Java System Active Server Pages, which can be exploited by malicious users to compromise a vulnerable system, and by malicious people to disclose sensitive information, manipulate certain data, bypass certain security restrictions, or to compromise a vulnerable system.
1) Input passed to an unspecified file included by various ASP applications is not properly verified before being used within a function to create files. This can be exploited to create or append to arbitrary files on the system.
2) A security issue is caused due to password and configuration data being stored within the application server root directory. This can be exploited to disclose sensitive information, e.g. configuration data or password hashes.
3) An input validation error exists within unspecified ASP applications, which can be exploited to disclose the content of arbitrary files or delete arbitrary files via specially crafted HTTP requests containing directory traversal sequences.
Successful exploitation of vulnerabilities #1 to #3 requires network access to the administration server (port 5100/TCP).
4) A boundary error exists in the handling of request within the ASP server, which can be exploited to cause a stack-based buffer overflow via a specially crafted request.
Successful exploitation allows execution of arbitrary code.
5) Various input to unspecified ASP applications is not properly sanitised before being used to execute shell commands. This can be exploited to inject and execute arbitrary shell commands via specially crafted HTTP requests containing shell meta-characters.
Successful exploitation requires authenticated access to the administration server (but see #6).
6) A design error can be exploited to bypass the authentication of the administration HTTP server by sending specially crafted requests to port 5102/TCP.
The vulnerabilities are reported in version 4.0.2. Other versions may also be affected.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Sun Java System Active Server Pages Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.