Oracle JSP/JSPSQL Remote File Reading Vulnerability

BID:2288

Info

Oracle JSP/JSPSQL Remote File Reading Vulnerability

Bugtraq ID: 2288
Class: Input Validation Error
CVE:
Remote: Yes
Local: No
Published: Jan 22 2000 12:00AM
Updated: Jan 22 2000 12:00AM
Credit: This vulnerability was announced to Bugtraq by Georgi Guninski <[email protected]> in his security advisory on January 22, 2001.
Vulnerable: Oracle Oracle8 8.1.7
- Microsoft Windows 2000 Professional
Not Vulnerable:

Discussion

Oracle JSP/JSPSQL Remote File Reading Vulnerability

A problem with Oracle on the Windows 2000 platform could allow users access to restricted information. This problem in the handling of input by the Oracle software may result in remote users being permitted read access to files on the same partition as the webroot directory.

Upon generating a custom crafted request to either the a.jsp file or the bb.sqljsp file, it is possible to force the JSP and JSPSQL handlers to ascend the directory tree outside of the webroot, and attempt to read the contents of the specified file in the request. Successful execution results in the files being moved to the http://host/_pages subdirectory, and the extension of the file being changed to a .java file.

This problem makes it possible for a user with malicious motives to access and read files that may be restricted and/or sensitive. It could also lead to a remote user gaining local access, and an elevation of privileges.

Exploit / POC

Oracle JSP/JSPSQL Remote File Reading Vulnerability

There are two methods of exploit this vulnerabillity, contributed by Georgi Guninski:

http://host/a.jsp//..//..//..//..//..//../winnt/win.ini

will copy the contents of the C:\winnt\win.ini file to a file in http://host/_pages, and change the extension to .java, with a "win" in the name of the file.

http://host/bb.sqljsp//..//..//..//..//..//../winnt/win.ini

will also copy the contents of the c:\winnt\win.ini file to a file in the http://host/_pages directory, and change the extension to .java, with "win" in the name of the file.

References

Oracle JSP/JSPSQL Remote File Reading Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report