26th Mar 2003 [SBWID-6097]
COMMAND
	JWALK application server Directory Traversal Vulnerability
SYSTEMS AFFECTED
	JWALK application server version 3.2C9
PROBLEM
	In  advisory  by  Andy  Davis  of  Information   Risk   Management   Plc
	[http://www.irmplc.com/advisories] :
	--snip--
	Recently during a penetration test IRM  identified  a  serious  security
	vulnerability with the Jwalk application web server  version  3.2C9.  It
	appears  that  by  issuing   a   URL   containing   unicode   characters
	representing "../" directory traversal is possible.
	IRM used the following URL to obtain the Windows password  file  on  the
	machine in question:
	
	 HTTP://<IP_address>/.%252e/.%252e/.%252e/winnt/repair/sam._
	
	The server process appears to be running with sufficient  privileges  to
	read any file on the server (assuming the  name  and  location  of  this
	file is known).
	--snap--
SOLUTION
	Get JWalk, 3.3c4
	A workaround involves using different vendor's web server to  serve  the
	Jwalk application