COMMAND
WebSphere Application Server
SYSTEMS AFFECTED
IBM WebSphere Application Server (all version up to and including 3.0.2)
PROBLEM
Following is based on Foundstone Security Advisory by Saumil Shah
and Stuart McClure. A show code vulnerability exists with IBM's
WebSphere Application Server for NT allowing an attacker to view
the source code of Java Server Pages (JSP) files.
The problem lies with the way WebSphere assigns handlers to
specific file types. For example, files with the extensions .jsp
are registered as Java Server Pages by WebSphere.
WebSphere being case sensitive, interprets .jsp and .JSP to be two
extensions. If a request for a .JSP file is made to WebSphere, it
cannot find a handler for the .JSP extension and therefore, it
uses the default handler, which is of type "text". Since the
underlying file system is Windows NT, it does not differentiate
between upper case and lower case filenames, and hence the
requested file ends up being served up as plain text without
being parsed or interpreted. On WebSphere running on Unix
servers, it flags a "File not Found" error.
Normally, JSP files are referred to in URLs using lower case
extensions. For example:
http://site.running.websphere/index.jsp
By changing any letters in the extension (.jsp) to upper case,
it is possible to obtain the unparsed source code of the JSP file.
For the above example, the exploit would be to access the
following URL:
http://site.running.websphere/index.JSP
SOLUTION
An efix (APAR #: PQ38936) is available and will be posted at:
http://www-4.ibm.com/software/webservers/appserv/efix.html