Vulnerabilities > CVE-2002-1451 - Information Disclosure vulnerability in Blazix Special Character Handling Server Side Script

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
desiderata-software
nessus
exploit available

Summary

Blazix before 1.2.2 allows remote attackers to read source code of JSP scripts or list restricted web directories via an HTTP request that ends in a (1) "+" or (2) "\" (backslash) character.

Vulnerable Configurations

Part Description Count
Application
Desiderata_Software
2

Exploit-Db

  • descriptionBlazix 1.2 Special Character Handling Server Side Script Information Disclosure. CVE-2002-1451. Remote exploits for multiple platform
    idEDB-ID:21751
    last seen2016-02-02
    modified2002-08-24
    published2002-08-24
    reporterAuriemma Luigi
    sourcehttps://www.exploit-db.com/download/21751/
    titleBlazix 1.2 Special Character Handling Server Side Script Information Disclosure
  • descriptionBlazix 1.2 Password Protected Directory Information Disclosure Vulnerability. CVE-2002-1451. Remote exploits for multiple platform
    idEDB-ID:21752
    last seen2016-02-02
    modified2002-08-25
    published2002-08-25
    reporterAuriemma Luigi
    sourcehttps://www.exploit-db.com/download/21752/
    titleBlazix 1.2 Password Protected Directory Information Disclosure Vulnerability

Nessus

NASL familyCGI abuses
NASL idBLAZIX_JSP_SOURCE.NASL
descriptionThe remote host is running the Blazix web server, a web server written in Java. The installed version of Blazix discloses the source code of its JSP pages by requesting the pages while appending a plus sign or a backslash to its name. An attacker may use this flaw to get the source code of your CGIs and possibly obtain passwords and other relevant information about this host.
last seen2020-06-01
modified2020-06-02
plugin id17151
published2005-02-19
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17151
titleBlazix Trailing Character JSP Source Disclosure
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(17151);
 script_bugtraq_id(5566, 5567);
 script_cve_id("CVE-2002-1451");

 script_version("1.15");
 
 name["english"] = "Blazix Trailing Character JSP Source Disclosure";
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running the Blazix web server, a web server written
in Java. 

The installed version of Blazix discloses the source code of its JSP
pages by requesting the pages while appending a plus sign or a
backslash to its name.  An attacker may use this flaw to get the
source code of your CGIs and possibly obtain passwords and other
relevant information about this host." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Aug/355" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Blazix 1.2.2 or newer." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/02/19");
 script_set_attribute(attribute:"vuln_publication_date", value: "2002/09/24");
 script_cvs_date("Date: 2018/11/15 20:50:16");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 summary["english"] = "Attempts to read the source of a jsp page";
 
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 family["english"] = "CGI abuses";
 script_family(english:family["english"]);
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_ports("Services/www", 80);
 exit(0);
}

# Check starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);


function check(file)
{
 local_var r, res;

 r = http_send_recv3(method:"GET", item:file, port:port);
 res = strcat(r[0], r[1], '\r\n', r[2]);
 if("<%" >< res) return 1;
 return 0;
}

banner = get_http_banner(port:port);
if ("Server: Blazix Java Server" >!< banner ) exit(0);

if(get_port_state(port))
{
 files = get_kb_list(string("www/", port, "/content/extensions/jsp"));
 if(isnull(files))files = make_list("/index.jsp");
 n = 0;
 foreach file (files)
  {
  if(check(file:file) == 0)
   {
   file = str_replace(string:file, find:".jsp", replace:".jsp+");
   if(check(file:file)) { security_warning(port); exit(0); }
  }
  n++;
  if(n > 10)exit(0);
 }
}