Dear bugtraq,
Thanks for your concern.
I saw BID 32804.
It is one incorrect information.
Tmax Soft JEUS 5 Fix#26 is not vulnerable. The vendor informs that
users upgrade to this version(Fix #26).
Please change this information.
Sincerely,
Simon
---------- Forwarded message ----------
From: Simon Ryeo <[email protected]>
Date: 2008/12/13
Subject: TmaxSoft JEUS Alternate Data Streams Vulnerability
To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Title: TmaxSoft JEUS Alternate Data Streams Vulnerability
Author: Simon Ryeo(bar4mi (at) gmail)
Severity: High
Impact: Remote File Disclosure
Vulnerable Version: < JEUS 5: Fix#26 on NTFS
References:
Description:
On NTFS TmaxSoft JEUS, which is an famous web application server, contained
a vulnerability that allows an attacker to obtain web application source
files. This was caused by ADSs(Alternate Data Streams; ::$DATA).
JEUS couldn't handle ::$DATA. So it treated test.jsp::$DATA as an normal
file when it requested.
This is similar to the past MS Widnows IIS vulnerability(Bid 0149).
Exploit:
The attacker can obtain them easily using an URL request.
http://www.target.com/foo/bar.jsp::$DATA
Solution:
The vendor released solutions for this problem.
Method 1) Upgrade JEUS
Please refer to TmaxSoft Homepage for detail support palns. It will be
valid until Mar. 2009.
(http://www.tmaxsoft.com)
-----BEGIN PGP SIGNATURE-----
Version: 9.8.3.4028
wj8DBQFJQqOXzuoR/xLtCioRAn2DAKDpN2ckXu7xt6OvYUeWHLiEoPQOmwCg6csI
KY69SPNXHg2rHlXJanIBQDw=
=SW3P
-----END PGP SIGNATURE------