Sun Java System Active Server Pages Multiple Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Sun Java System Active Server Pages, which can be exploited by malicious users to compromise a vulnerable system, and by malicious people to disclose sensitive information, manipulate certain data, bypass certain security restrictions, or to compromise a vulnerable system.
1. Due to input passed to an unspecified file included by various ASP applications is not properly verified before being used within a function to create files. This can be exploited to create or append to arbitrary files on the system.
2. Due to password and configuration data being stored within the application server root directory. This can be exploited to disclose sensitive information, e.g. configuration data or password hashes.
3. Due to an input validation error exists within unspecified ASP applications, which can be exploited to disclose the content of arbitrary files or delete arbitrary files via specially crafted HTTP requests containing directory traversal sequences.
Successful exploitation of vulnerabilities #1 to #3 requires network access to the administration server (port 5100/TCP).
4. Due to a boundary error exists in the handling of request within the ASP server, which can be exploited to cause a stack-based buffer overflow via a specially crafted request.
Successful exploitation allows execution of arbitrary code.
5. Due to various input to unspecified ASP applications is not properly sanitised before being used to execute shell commands. This can be exploited to inject and execute arbitrary shell commands via specially crafted HTTP requests containing shell meta-characters.
Successful exploitation requires authenticated access to the administration server (but see #6).
6. Due to a design error can be exploited to bypass the authentication of the administration HTTP server by sending specially crafted requests to port 5102/TCP.
Impact
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Sun Java System Active Server Pages 4.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 4.0.3
https://cds.sun.com/is-bin/INTERSHOP.enfinity/....Detail-Start?ProductRef=SJASP-4.0.3-OTH-G-TP@CDS-CDS_SMI
Vulnerability Identifier
Source
Related Link
Share with