Allaire JRun Crafted Request Forced Directory Listing

medium Nessus Plugin ID 10604

Synopsis

The remote web server is affected by an information disclosure vulnerability.

Description

The version of Allaire JRun running on the remote host is affected by an information disclosure vulnerability. An unauthenticated, remote attacker can exploit this, by using a crafted URL request with '/./' prepended, to display a listing of a remote directory, even if a valid index file exists in the directory.

Solution

Upgrade to JRun version 3.0sp2.

Plugin Details

Severity: Medium

ID: 10604

File Name: jrun_dir_listing.nasl

Version: 1.35

Type: remote

Family: CGI abuses

Published: 1/29/2001

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:macromedia:jrun

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 10/23/2000

Reference Information

CVE: CVE-2000-1050

BID: 1830