[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : IBM WebSphere default servlet handler showcode vulnerability

Title: IBM WebSphere default servlet handler showcode vulnerability
Released by: Foundstone
Date: 24th July 2000
Printable version: Click here
                             Foundstone, Inc.

                        http://www.foundstone.com

                      "Securing the Dot Com World"



                           Security Advisory



     IBM WebSphere default servlet handler showcode vulnerability



----------------------------------------------------------------------

FS Advisory ID:         FS-072400-6-IBM



Release Date:           July 24, 2000



Product:                IBM WebSphere Application Server 3.0.2



Vendor:                 IBM  http://www-4.ibm.com/software/webservers/

                             appserv/



Vendor Advisory:        none issued so far.



Type:                   Unparsed pages: Show code vulnerability



Author:                 Shreeraj Shah (shreeraj.shah@foundstone.com)

                        Saumil Shah (saumil.shah@foundstone.com)



Operating Systems:      All operating systems

----------------------------------------------------------------------



Description



        A show code vulnerability exists with IBM's Websphere allowing

        an attacker to view the source code of any file within the web

        document root of the web server.



Details



        IBM WebSphere uses Java Servlets to handle parsing of various

        types of pages (for example, HTML, JSP, JHTML, etc). In

        addition to different servlets for handling different kinds of

        pages, WebSphere also has a default servlet which is called

        upon if a requested file does not have a registered handler.



        It is possible to force the default servlet to be invoked if

        the file path in the URL is prefixed with "/servlet/file/",

        which causes pages to be displayed without being parsed or

        compiled.



Vulnerable versions



        All versions of IBM WebSphere 3.0.2



Verification of the vulnerability



        It is easy to verify this vulnerability for a given system.

        Prefixing the path to web pages with "/servlet/file/" in the

        URL causes the file to be displayed without being parsed or

        compiled. For example if the URL for a file "login.jsp" is:



        http://site.running.websphere/login.jsp



        then accessing



        http://site.running.websphere/servlet/file/login.jsp



        would cause the unparsed contents of the file to show up in

        the web browser.



Solution



        Workaround:

        Remove the InvokerServlet from the webapplication



        Fix:

        APAR PQ39857 will be available soon at the site:

        http://www-4.ibm.com/software/webservers/appserv/efix.html



Credits



        We would like to thank IBM for their prompt and serious

        reaction to this problem.



Disclaimer



        THE INFORMATION CONTAINED IN THIS ADVISORY IS THE COPYRIGHT

        (C) 2000 OF FOUNDSTONE, INC. AND BELIEVED TO BE ACCURATE AT

        THE TIME OF PRINTING, BUT NO REPRESENTATION OR WARRANTY IS

        GIVEN, EXPRESS OR IMPLIED, AS TO ITS ACCURACY OR COMPLETENESS.

        NEITHER THE AUTHOR NOR THE PUBLISHER ACCEPTS ANY LIABILITY

        WHATSOEVER FOR ANY DIRECT, INDIRECT OR CONSEQUENTIAL LOSS OR

        DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR RELIANCE PLACED

        ON, THIS INFORMATION FOR ANY PURPOSE. THIS ADVISORY MAY BE

        REDISTRIBUTED PROVIDED THAT NO FEE IS ASSIGNED AND THAT THE

        ADVISORY IS NOT MODIFIED IN ANY WAY.








(C) 1999-2000 All rights reserved.