Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   Resin Vendors:   Caucho Technology
Resin Input Validation Flaw in Documentation Viewer Lets Remote Users Traverse the Web Root Directory
SecurityTracker Alert ID:  1016110
SecurityTracker URL:
CVE Reference:   CVE-2006-2438   (Links to External Site)
Updated:  Sep 1 2009
Original Entry Date:  May 16 2006
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 3.0.17, 3.0.18
Description:   A vulnerability was reported in Caucho Resin. A remote user can view files on the target system.

The Resin documentation viewfile servlet does not properly validate user-supplied input. A remote user can supply a URL with a specially crafted 'contextpath' parameter to view files outside of the 'resin-doc' directory but within the web root directory.

A remote user can exploit this to, for example, view class files.

A demonstration exploit URL is provided:


A remote user can also supply a non-existent path to cause the server to disclose the installation path.

Systems that use the standard 'resin.conf' configuration file and Resin directory structure for configuring the application are affected.

The vendor was notified on May 5, 2006.

ScanAlert's Security and Enterprise Services Teams discovered this vulnerability.

Impact:   A remote user can view all files within the web root directory on the target system.
Solution:   The vendor has issued a fixed version (3.0.19), available at:

The report indicates that you can also remove the resin-doc.war file from all production systems and that you should not deploy using default configuration files.

Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  ScanAlert Security Advisory

ScanAlert Security Advisory

Caucho Resin Multiple Vulnerabilities - Arbitrary File Access & Information

Date: 5/16/06
Vendor: Caucho
Package: Resin

Common Vulnerability Scoring System (CVSS) -
Related Exploit Range: Remote
Attack Complexity: Low 
Confidentiality Impact: Partial 
Integrity Impact: Partial 
Availability Impact: None


Caucho Resin is a high performance, Sun certified J2EE server featuring load
balancing for increased reliability. Resin is well known for its flexibility
and ease of use, saving both engineering time and staff costs. 


Resin contains documentation that is available in the /webapps directory and
is an expanded war file available at /resin-doc by default when using the
standard resin.conf and Resin directory structure for configuring the

This documentation contains a servlet for viewing files within the
integrated tutorial:


The viewfile servlet can easily read any file within the web root with no


It is possible to set the context path outside of the resin-doc and read any
file on alternate web roots:


When resin-doc is installed on a system it is possible to read all files
contained within the web root including class files which can then be
decompiled to view the Java source:


An incorrect path in the request will reveal the absolute installation path:

File not found


Remove the resin-doc.war file from all production systems and do not deploy
using default configuration files. Upgrade to version 3.0.19 or better.

Resolution Timeline:

Vendor Notification: May 5, 2006
Vendor Response: May 9, 2006
Vendor Fix: May 15, 2006
Coordinated public release of advisory: May 16, 2006

ScanAlert's mission is to make the web safe from hackers.

We make web sites secure from hackers and certify it to their customers via
security audits and real-time certification enables consumers to know
whether the sites where they shop are taking the necessary steps to
safeguard their personal information from hackers. By alleviating consumers'
fears of identity theft and credit card fraud, online merchants who earn
HACKER SAFE certification consistently see substantial increases in online

For additional information regarding ScanAlert and the Hacker Safe program
please contact:

ScanAlert (
860 Napa Valley Corporate Way
Suite R
Napa, CA 94558
Phone: 877 302-9965 
Int'l: 707 224-7656 
Fax: 707 252-9626


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC