OpenConnect WebConnect 6.4/6.5 - jretest.html Traversal Arbitrary File Access
Author: Dennis Rand
type: remote
platform: windows
port:
date_added: 2005-02-21
date_updated: 2013-05-02
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/12613/info
OpenConnect WebConnect is reported prone to multiple vulnerabilities. The following individual issues are reported:
WebConnect is reported prone to a remote denial of service vulnerability.
A remote attacker may exploit this vulnerability to crash the WebConnect software and deny service for legitimate users.
A directory traversal vulnerability is also reported to affect WebConnect. This issue is reported to exist due to a lack of sufficient sanitization performed on a user-supplied URI parameter that is passed to the 'jretest.html' script.
A remote attacker may exploit this vulnerability to disclose the contents of server readable files.
http://www.example.com:2080/jretest.html?lang=&parms=default&WCP_USER=..//..//..//..//..//boot.ini&action=
http://www.example.com:2080/COM1