OpenConnect WebConnect 6.4/6.5 - jretest.html Traversal Arbitrary File Access

Author: Dennis Rand
type: remote
platform: windows
port: 
date_added: 2005-02-21  
date_updated: 2013-05-02  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 25146.txt  
source: https://www.securityfocus.com/bid/12613/info

OpenConnect WebConnect is reported prone to multiple vulnerabilities. The following individual issues are reported:

WebConnect is reported prone to a remote denial of service vulnerability.

A remote attacker may exploit this vulnerability to crash the WebConnect software and deny service for legitimate users.

A directory traversal vulnerability is also reported to affect WebConnect. This issue is reported to exist due to a lack of sufficient sanitization performed on a user-supplied URI parameter that is passed to the 'jretest.html' script.

A remote attacker may exploit this vulnerability to disclose the contents of server readable files.

http://www.example.com:2080/jretest.html?lang=&parms=default&WCP_USER=..//..//..//..//..//boot.ini&action=
http://www.example.com:2080/COM1