Novell NetWare 6.0 Tomcat source.jsp Traversal Arbitrary File Access

high Nessus Plugin ID 12119

Language:

Synopsis

Sensitive data can be read on the remote data.

Description

The Apache Tomcat server distributed with NetWare 6.0 has a directory traversal vulnerability. As a result, sensitive information could be obtained from the NetWare server, such as the RCONSOLE password located in AUTOEXEC.NCF.

Example :

http://target/examples/jsp/source.jsp?%2e%2e/%2e%2e/%2e%2e/%2e%2e/system/autoexec.ncf

Solution

Upgrade Tomcat to the latest version, or disable the service if it is not required.
Remove default files from the web server. Also, ensure the RCONSOLE password is encrypted and utilize a password protected screensaver for console access.

Plugin Details

Severity: High

ID: 12119

File Name: netware_tomcat_sourcecode_viewer.nasl

Version: 1.16

Type: remote

Family: Netware

Published: 3/30/2004

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

CPE: cpe:/o:novell:netware, cpe:/a:apache:tomcat

Vulnerability Publication Date: 3/21/2000

Reference Information

CVE: CVE-2000-1210