26th Sep 2002 [SBWID-5324]
COMMAND
	Bea Weblogic incorrect URL parsing issues
SYSTEMS AFFECTED
	Tested on :
	 Bea Weblogic V6.1 Service Pack 2 on Windows 2000 Server
PROBLEM
	In Peter Gründl of KPMG Danemark advisory [BUG-ID: 2002016] :
	The  Bea  Weblogic  server  incorrectly  parses  certain  types  of  URL
	requests. This can result in the physical path being revealed, a  Denial
	of Service situation and revealing of .jsp sourcecode.
	
	 Physical webroot)
	
	By appending %00.jsp to a normal .html request, a compiler  error  would
	in some cases be  generated  that  would  print  out  the  path  to  the
	physical web root. A similar result can be achieved  by  prefixing  with
	%5c (backslash):
	
	 Denial of Service)
	
	This issue is very similar to  the  one  reported  in  KPMG-2002003,  in
	which we published that requesting a DOS device and  appending  .jsp  to
	the request would exhaust the working threads and cause the web  service
	to stop parsing HTTP and HTTPS requests.
	If a malicious user also added %00 in the request, it would still work.
	The server can handle about 10-11 working threads, so when  this  number
	of active threads has been reached, the server will  no  longer  service
	any requests. Since both HTTP and HTTPS are handled by the same  module,
	both are crippled if one is attacked.
	
	 Sourcecode revealed)
	
	There are a number of ways to manipulate the URL  in  a  way  that  will
	allow a malicious user to read the contents of a .jsp file. One  way  is
	to append "%00x" to the request, another could be to  add  "+."  to  the
	request (exclamation marks excluded).
SOLUTION
	Get patch from :
	
	http://dev2dev.bea.com/resourcelibrary/advisoriesdetail.jsp?
	highlight=advisoriesnotifications&path=components/dev2dev/
	resourcelibrary/advisoriesnotifications/
	securityadvisoriesbea020303.htm