Allaire Jrun "jsessionID" information leak vulnerability

xiaoxiao2021-03-06  73

Allaire Jrun "jsessionID" information leak vulnerability

Release Date: 2001-12-6


Affected system: Allaire Jrun 3.0

- IBM AIX 4.2

- IBM AIX 4.3

- Microsoft Windows 95

- Microsoft Windows 98

- Microsoft Windows 2000

- Microsoft Windows 2000 SP1

- Microsoft Windows 2000 SP2

- Microsoft Windows NT 4.0

- Microsoft Windows NT 4.0Sp1

- Microsoft Windows NT 4.0SP2

- Microsoft Windows NT 4.0SP3

- Microsoft Windows NT 4.0SP4

- Microsoft Windows NT 4.0sp6

- Microsoft Windows NT 4.0SP6A

- Redhat Linux 6.0 i386

- Redhat Linux 6.0 SPARC

- Redhat Linux 6.1 alpha

- Redhat Linux 6.1 i386

- Redhat Linux 6.1 SPARC

- SGI Irix 6.5

- Sun Solaris 2.6

- Sun Solaris 7.0

Allaire Jrun 3.1

- IBM AIX 4.2

- IBM AIX 4.3

- Microsoft Windows 95

- Microsoft Windows 98

- Microsoft Windows 2000

- Microsoft Windows 2000 SP1

- Microsoft Windows 2000 SP2

- Microsoft Windows NT 4.0

- Microsoft Windows NT 4.0Sp1

- Microsoft Windows NT 4.0SP2

- Microsoft Windows NT 4.0SP3

- Microsoft Windows NT 4.0SP4

- Microsoft Windows NT 4.0SP5

- Microsoft Windows NT 4.0sp6

- Microsoft Windows NT 4.0SP6A

- Redhat Linux 6.0 alpha

- Redhat Linux 6.0 i386

- Redhat Linux 6.0 SPARC

- Redhat Linux 6.1 alpha

- Redhat Linux 6.1 i386

- Redhat Linux 6.1 SPARC

- SGI Irix 6.5

- Sun Solaris 7.0

- Sun Solaris 8.0


Description:

-------------------------------------------------- ------------------------------


Bugtraq ID: 3665


JRUN is a JSP server published by Allaire.


There is a security issue in this software, which may cause sensitive information disclosure.


When the user accesses JRUN-based sites, it will get a session ID, and under certain conditions, this

The session ID is attached to the URL, which can cause this information to leak.


<* Source: Macromedia Security Alert (newsflash@macromedia.com)

link

http://archives.neohapsis.com/archives/bugtraq/2001-12/0091.html <; br>


http://www.allaire.com/handlers/index.cfm?id=22266&Method=FULLF

*>




-------------------------------------------------- ------------------------------

Suggestion:

Temporary solution:


If you cannot install patch or upgrade immediately, NSFOCUS recommends that you take the following measures to reduce threats:


* Temporarily use other secure JSP servers, such as Apache Tomcat, etc.


Vendor patch:


At present, manufacturers have released patches to fix this security problem, please go to the manufacturer's homepage:


Allaire JRun 3.0:


Macromedia Patch JRun Win32 JR30SP2_25232.EXE

http://download.allaire.com/publicddl/en/jrun/30/jr30sp2_25232.exe


Macromedia Upgrade JRun Unix JR30SP2U_25232.SH

Http://download.allaire.com/publicddl/en/jrun/30/jr30sp2u_25232.sh


Allaire Jrun 3.1:


Macromedia Patch JRun Win32 JRUN-31-Win-Upgrade-US_26414.EXE

Http://download.allaire.com/publicddl/en/jrun/31/jrun-31-win-upgrade-us_26414.exe


Macromedia Upgrade Jrun Unix-31-Unix-Upgrade-us_26414.sh
http://download.allaire.com/publicddl/en/jrun/31/jrun-31-unix-Upgrade-us_26414.sh

转载请注明原文地址:https://www.9cbs.com/read-121064.html

New Post(0)