Resin Input Validation Flaw in the Built-in Web Server Lets Remote Users Traverse the Directory By Specifying an Absolute Path
SecurityTracker Alert ID: 1016109|
SecurityTracker URL: http://securitytracker.com/id/1016109
(Links to External Site)
Date: May 16 2006
Disclosure of system information, Disclosure of user information|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes |
Version(s): 3.0.17, 3.0.18|
A vulnerability was reported in Caucho Resin in the built-in web server. A remote user can view arbitrary files on the target system.|
A remote user can create a specially crafted URL that requests a file by its absolute path (with the '%5C' character for the windows directory separator '\') to view any file on the specified drive.
A demonstration exploit URL is provided:
The vendor was notified on April 20, 2006.
Rapid7 discovered this vulnerability.
The original advisory is available at:
A remote user can view arbitrary files on the target system.|
The vendor has issued a fixed version (3.0.19), available at:|
Vendor URL: www.caucho.com/ (Links to External Site)
Access control error, Input validation error|
|Underlying OS: Windows (Any)|
Source Message Contents
Subject: Caucho Resin Windows Directory Traversal Vulnerability|
Rapid7 Security Advisory
Visit http://www.rapid7.com/ to download NeXpose,
SC Magazine Winner of Best Vulnerability Management product.
Rapid7 Advisory R7-0024
Caucho Resin Windows Directory Traversal Vulnerability
Published: May 16, 2006
1. Affected system(s):
o Caucho Resin v3.0.18 for Windows
o Caucho Resin v3.0.17 for Windows
o Caucho Resin v3.0.19
o Caucho Resin v3.0.16 and earlier
The Caucho Resin web application server for Windows contains a
directory traversal vulnerability that allows remote
unauthenticated users to download any file from the system. It is
possible to download files from any drive on the system.
Rapid7 have updated NeXpose to check for this vulnerability. Licensed
customers will receive the new vulnerability checks automatically.
Visit http://www.rapid7.com to register for a free demo of NeXpose.
3. Vendor status and information
Caucho Technology, Inc.
Caucho was notified of this vulnerability on April 20th, 2006.
They fixed this vulnerability in the latest unofficial snapshot
of Resin 3.0.19, available from Caucho's website.
Upgrade to the latest snapshot version of Resin, version 3.0.19.
5. Detailed analysis
Caucho Resin is a servlet and JSP server. Resin ships with its own
standalone web server which runs by default on port 8080. Any remote
user can request URLs of the form:
to access the root of the C: drive (and any files below it). Any
drive letter can be specified. Only Resin on Windows is vulnerable.
This vulnerability appears to have been introduced in Resin
version 3.0.17, although this has not been confirmed by the vendor.
6. Contact Information
Rapid7 Security Advisories
Phone: +1 (617) 603-0700
7. Disclaimer and Copyright
Rapid7, LLC is not responsible for the misuse of the information
provided in our security advisories. These advisories are a service
to the professional security community. There are NO WARRANTIES
with regard to this information. Any application or distribution of
this information constitutes acceptance AS IS, at the user's own
risk. This information is subject to change without notice.
This advisory Copyright (C) 2006 Rapid7, LLC. Permission is
hereby granted to redistribute this advisory, providing that no
changes are made and that the copyright notices and disclaimers