Vulnerabilities > CVE-2006-5750 - Directory Traversal vulnerability in JBoss Java Class DeploymentFileRepository

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
jboss
nessus

Summary

Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_JBOSS4-2304.NASL
    descriptionThis update fixes a problem in the JBOSS server where it was possible to potentially execute code if the console manager was enabled. (CVE-2006-5750)
    last seen2020-06-01
    modified2020-06-02
    plugin id27282
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27282
    titleopenSUSE 10 Security Update : jboss4 (jboss4-2304)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update jboss4-2304.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(27282);
      script_version ("1.14");
      script_cvs_date("Date: 2019/10/25 13:36:28");
    
      script_cve_id("CVE-2006-5750");
    
      script_name(english:"openSUSE 10 Security Update : jboss4 (jboss4-2304)");
      script_summary(english:"Check for the jboss4-2304 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update fixes a problem in the JBOSS server where it was possible
    to potentially execute code if the console manager was enabled.
    (CVE-2006-5750)"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected jboss4 package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:jboss4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/11/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/10/17");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE10\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE10.1", reference:"jboss4-4.0.3SP1-11.2") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jboss4");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_JBOSS-2309.NASL
    descriptionThis update fixes a problem in the JBOSS server where it was possible to potentially execute code if the console manager was enabled. (CVE-2006-5750)
    last seen2020-06-01
    modified2020-06-02
    plugin id27281
    published2007-10-17
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27281
    titleopenSUSE 10 Security Update : jboss (jboss-2309)
  • NASL familyCGI abuses
    NASL idJBOSS_DEPLOYMENTFILEREPOSITORY_DIR_TRAVERSAL.NASL
    descriptionThe remote web server appears to be a version of JBoss that fails to sanitize user-supplied input to the BaseDir parameter used by the
    last seen2020-06-01
    modified2020-06-02
    plugin id23843
    published2006-12-14
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/23843
    titleJBoss Application Server (jbossas) JMX Console DeploymentFileRepository Traversal Arbitrary File Manipulation

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/89294/jboss_deploymentfilerepository.rb.txt
idPACKETSTORM:89294
last seen2016-12-05
published2010-05-08
reporterMC
sourcehttps://packetstormsecurity.com/files/89294/JBoss-Java-Class-DeploymentFileRepository-Directory-Traversal.html
titleJBoss Java Class DeploymentFileRepository Directory Traversal

Redhat

advisories
rhsa
idRHSA-2006:0743
rpmsjbossas-0:4.0.4-1.el4s1.25

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 21219 CVE ID: CVE-2006-5750 Jboss是非常流行的开源J2EE应用服务器。 JBoss应用服务器的DeploymentFileRepository类没有正确地过滤用户提供输入,通过认证的远程用户可以通过向默认监听于 8080端口上的控制台管理器提交恶意请求执行目录遍历攻击,导致读取、删除、覆盖或修改任意文件,最终可以在系统上执行任意命令。 JBoss Group JBoss Application Server 4.0.4 厂商补丁: RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2006:0743-01)以及相应补丁: RHSA-2006:0743-01:Critical: jbossas security update 链接:https://rhn.redhat.com/errata/RHSA-2006-0743.html JBoss Group ----------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://jira.jboss.com/jira/browse/ASPATCH-126
idSSV:19811
last seen2017-11-19
modified2010-06-18
published2010-06-18
reporterRoot
titleJBoss应用服务器DeploymentFileRepository类目录遍历漏洞