Vulnerabilities > CVE-2003-0411 - Improper Handling of Case Sensitivity vulnerability in Oracle SUN ONE Application Server 7.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
low complexity
oracle
CWE-178
nessus
exploit available

Summary

Sun ONE Application Server 7.0 for Windows 2000/XP allows remote attackers to obtain JSP source code via a request that uses the uppercase ".JSP" extension instead of the lowercase .jsp extension.

Vulnerable Configurations

Part Description Count
Application
Oracle
1
OS
Microsoft
2

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionSun ONE Application Server 7.0 Source Disclosure Vulnerability. CVE-2003-0411. Remote exploit for windows platform
idEDB-ID:22664
last seen2016-02-02
modified2003-05-27
published2003-05-27
reporterSPI Labs
sourcehttps://www.exploit-db.com/download/22664/
titleSun ONE Application Server 7.0 Source Disclosure Vulnerability

Nessus

NASL familyCGI abuses
NASL idSUN_ONE_JSP_SOURCE.NASL
descriptionIt is possible to make the remote web server disclose the source code of its JSP pages by requesting the pages with a different case (ie: filename.JSP instead of filename.jsp). An attacker may use this flaw to get the source code of your CGIs and possibly obtain passwords and other relevant information about this host.
last seen2020-06-01
modified2020-06-02
plugin id11658
published2003-05-28
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11658
titleSun ONE Application Server Upper Case Request JSP Source Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

# Ref:
# From: "SPI Labs" <[email protected]>
# To: <[email protected]>
# Subject: Multiple Vulnerabilities in Sun-One Application Server
# Date: Tue, 27 May 2003 18:48:04 -0400  

include("compat.inc");

if (description)
{
 script_id(11658);
 script_version("1.21");
 script_cvs_date("Date: 2018/07/31 17:27:53");

 script_cve_id("CVE-2003-0411");
 script_bugtraq_id(7709);
 
 script_name(english:"Sun ONE Application Server Upper Case Request JSP Source Disclosure");
 script_summary(english:"Attempts to read the source of a jsp page");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure
vulnerability.");
 script_set_attribute(attribute:"description", value:
"It is possible to make the remote web server disclose the source code
of its JSP pages by requesting the pages with a different case (ie:
filename.JSP instead of filename.jsp). 

An attacker may use this flaw to get the source code of your CGIs and
possibly obtain passwords and other relevant information about this
host.");
 script_set_attribute(attribute:"solution", value:
"Upgrade to Sun ONE Application Server 7.0 Update Release 1.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value:"2003/05/28");
 script_set_attribute(attribute:"vuln_publication_date", value:"2003/05/26");
 script_set_attribute(attribute:"patch_publication_date", value:"2003/06/03");

 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

# Check starts here

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

global_var	port;

function check(file)
{
 local_var	r;
 r = http_send_recv3(method: "GET", item:file, port:port, exit_on_fail: 1);
 if("<%" >< r[2]) return 1;
 return 0;
}

port = get_http_port(default:80);

 files = get_kb_list(string("www/", port, "/content/extensions/jsp"));
 if(isnull(files))files = make_list("/index.jsp");
 n = 0;
 foreach file (files)
  {
  if(check(file:file) == 0)
   {
   file2 = str_replace(string:file, find:".jsp", replace:".JSP");
   if(check(file:file2))
   {
    if (report_verbosity >= 1)
    {
      txt = strcat('\nFor example :\n', build_url(port: port, qs: file), '\n',
      	  build_url(port: port, qs: file2), '\n');
      security_warning(port:port, extra: txt);
    }
    else
    security_warning(port);
    exit(0);
    }
  }
  n ++;
  if(n > 20)exit(0);
 }