JRun Web Server (JWS) GET Request Traversal Arbitrary File Access

medium Nessus Plugin ID 10997

Synopsis

The remote web server is prone to a directory traversal attack.

Description

This host is running the Allaire JRun web server. Versions 2.3.3, 3.0, and 3.1 are vulnerable to a directory traversal attack. This allows a potential intruder to view the contents of any file on the system.

Solution

The vendor has addressed this issue in Macromedia Product Security Bulletin MPSB01-17.

Plugin Details

Severity: Medium

ID: 10997

File Name: DDI_JRun_Traversal.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 6/5/2002

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/jrun

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/6/2001

Reference Information

CVE: CVE-2001-1544

BID: 3666