26th Mar 2003 [SBWID-6097]
COMMAND
JWALK application server Directory Traversal Vulnerability
SYSTEMS AFFECTED
JWALK application server version 3.2C9
PROBLEM
In advisory by Andy Davis of Information Risk Management Plc
[http://www.irmplc.com/advisories] :
--snip--
Recently during a penetration test IRM identified a serious security
vulnerability with the Jwalk application web server version 3.2C9. It
appears that by issuing a URL containing unicode characters
representing "../" directory traversal is possible.
IRM used the following URL to obtain the Windows password file on the
machine in question:
HTTP://<IP_address>/.%252e/.%252e/.%252e/winnt/repair/sam._
The server process appears to be running with sufficient privileges to
read any file on the server (assuming the name and location of this
file is known).
--snap--
SOLUTION
Get JWalk, 3.3c4
A workaround involves using different vendor's web server to serve the
Jwalk application