Type packetstorm
Reporter Moshe BA
Modified 2008-02-14T00:00:00


                                            `_*JSPWiki Multiple Vulnerabilities*_  
_*Janne Jalkanen JSPWiki – http://www.jspwiki.org   
Application Description:  
_*From JSPWiki website - “JSPWiki is a feature-rich and extensible   
WikiWiki engine built around a standart J2EE components (Java, servlets,   
*_Tested versions:  
_*JSPWiki v2.4.104  
JSPWiki v2.5.139  
/Earlier versions may also be affected.  
JSPWiki Local .jsp File Inclusion Vulnerability  
_*An input validation problem exists within JSPWiki which allows to   
execute (include) arbitrary local .jsp files. An attacker may leverage   
this issue to execute arbitrary server-side script code on a vulnerable   
server with the privileges of the web server process.  
/Example (including //rss.jsp// file from the application root directory):/  
/Note: //page// parameter must be an existing page on the server./  
This grants an attacker unauthorized access to sensitive .jsp files on   
the server and can lead to information disclosure.  
The first example disclose sensitive information such as the full path   
of the application on the server, page (and attachments) storage path,   
log files and work directory by including the application installation   
The second example disclose the application security configurations by   
including the JSPWiki Security Configuration Verifier file   
In addition, JSPWiki allow users to upload (attach) files to entry   
pages. An attacker can use the information disclosed by the installation   
file to upload a malicious .jsp file and locally execute it.  
_By executing malicious server-side code, an attacker may be able to   
compromise the server._  
*_JSPWiki Cross-Site Scripting Vulnerability  
_*An attacker may leverage cross-site scripting vulnerability to have   
arbitrary script code executed in the browser of an unsuspecting user in   
the context of the affected site. This may facilitate the theft of   
cookie-based authentication credentials as well as other attacks.  
_*Original Document:  
*_Download PDF:  
_*Moshe BA  
BugSec LTD. - Security Consulting Company  
Tel: +972-3-9622655  
Fax: +972-3-9511433  
Email: Info -at- BugSec -d0t- com  
http://www.bugsec.com <http://www.bugsec.com/>  
Moshe :: Trancer  
0nly Human.