vendor:
JSFTemplating, Mojarra Scales, GlassFish Application Server v3 Preview
by:
J. Greil / SEC Consult
N/A
CVSS
N/A
Directory Traversal
22
CWE
Product Name: JSFTemplating, Mojarra Scales, GlassFish Application Server v3 Preview
Affected Version From: JSFTemplating: all versions < v1.2.11 Mojarra Scales: all versions < v1.3.2 GlassFish: v3 Preview
Affected Version To: JSFTemplating: v1.2.11 Mojarra Scales: v1.3.2 GlassFish: v2 is not affected according to vendor
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
File disclosure vulnerability in JSFTemplating, Mojarra Scales and GlassFish Application Server v3 Admin console
The JSFTemplating FileStreamer functionality (when using the PhaseListener), basically used for including static or dynamic content, such as Yahoo UI API files w/o the need to deploy them, is vulnerable to directory traversal attacks. The Mojarra Scales project, which is used in the GlassFish Application Server v3 Admin console, is also vulnerable to directory traversal attacks. The following URL can be used to access arbitrary files on the server: http://[host]/[context]/faces/javax.faces.resource/[file]?ln=[path] where [file] is the file to be included and [path] is the directory traversal path.
Mitigation:
Upgrade to the latest version of the affected products. JSFTemplating: v1.2.11 Mojarra Scales: v1.3.2 GlassFish: v2 is not affected according to vendor