Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   Red Hat JBoss Vendors:   JBoss Group
JBoss Input Validation Hole May Disclose Installation Path and Configuration File to Remote Users
SecurityTracker Alert ID:  1014234
SecurityTracker URL:
CVE Reference:   CVE-2005-2006   (Links to External Site)
Updated:  Feb 9 2006
Original Entry Date:  Jun 18 2005
Impact:   Disclosure of system information
Exploit Included:  Yes  
Version(s): 3.2.2 - 3.2.7, 4.0.2
Description:   A vulnerability was reported in JBoss. A remote user may be able to determine the installation path or obtain configuration data.

The 'org.jboss.web.WebServer' class does not properly process certain user-supplied requests.

A demonstration exploit request to obtain the installation path is provided:

GET %. HTTP/1.0

A demonstration exploit request to obtain the configuration file is provided:

GET %server.policy HTTP/1.0

Marc Schoenefeld is credited with discovering this vulnerability.

Impact:   A remote user can determine the installation path.

A remote user can obtain the server policy configuration file.

Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Java, Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC