Servlet Exec Multiple Security Issues
Servlet Exec 5.0p06 on Microsoft IIS 6.0
Minded Security ReferenceID:
Stefano Di Paola and Giorgio Fedon of Minded Security
Stefano Di Paola stefano.dipaola [_at_] mindedsecurity.com discovered the
first issue (Path Traversal) and
Giorgio Fedon giorgio.fedon [_at_] mindedsecurity.com discovered the second
issue (Authentication Bypass)
High: Attackers may be able to read application secrets stored in configuration
files or to bypass authentication on the Servlet Exec administrative interface.
Update your installation with July 2010 hotfix:
Minded Security Consultants discovered during a penetration testing activity that New Atlanta Servlet Exec may permit to read system configuration files or to get access to system information without valid credentials.
First Issue: Path Traversal
Minded Security consultants were able to access arbitrary files on servlet exec system path by abusing a flaw in the administration help of the ServletExec platform. In fact, by requesting the following url:
It's possible to download the "web.xml" file of an application.
Second issue: Authentication Bypass
Furthermore we discovered that some functionalities of the Servlet Exec Administrative Interface can be accessed without any valid user credential. By supplying a properly crafted request to the Servlet interface, it's possible to have direct access to precompiled JSP pages stored inside the "Servlet Exec
The following request will display the login interface:
It's very important to observe that a direct access to "Servlet Exec Administrative" functionalities, may lead to a full system compromise, if the attacker is be able to deploy his own malicious code on the protected environment.
The following request will show the system properties:
Other examples include, for example, the unauthorized access to the "Log Configuration":
Unauthorized access to Administrative User Management panel:
Access to virtual server management:
Access to Admin Optional packages configuration section:
Access to Data Sources configuration section:
Access to Admin Debug configuration section:
26/02/2009 Issue found
29/04/2010 Reported to Vendor
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Any use of this information is at the user's own risk. Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of Minded Security Research Lab. If you wish to reprint the whole or any part of this Alert in any other medium excluding
electronic medium, please e-mail research_at_mindedsecurity.com for permission.
Copyright (c) 2010 Minded Security, S.r.l..
All rights reserved worldwide.
end users protected
dynamic web pages scanned
Recently Lenovo hit the news because they got caught installing adware on their laptops, namely Superfish, ...
As a follow up of our Troopers 2015 presentation about CVE-2011-2461 we want to release more details about a real world exploitation scenario targeting Google services.During our large-scale an...
During a recent mobile application security analysis for one of our clients, we identified a quite unobvious behaviour in apps that use the AFNetworking library.It turned out that because of a logic flaw in the latest version...