{ "Name": "Caucho Resin 4.0.52 4.0.56 Directory Traversal", "Description": "

Resin is Caucho's web server and Java application server.

Resin server version 4.0.52 to 4.0.56 has a directory traversal vulnerability. Attackers can use; to read web configuration files to take over the system further.

", "Product": "Caucho Resin", "Homepage": "https://caucho.com", "DisclosureDate": "2021-11-01", "Author": "1291904552@qq.com", "FofaQuery": "banner=\"Resin/4.0.52\"|| header=\"Resin/4.0.52\"||banner=\"Resin/4.0.53\"|| header=\"Resin/4.0.53\"||banner=\"Resin/4.0.54\"|| header=\"Resin/4.0.54\"||banner=\"Resin/4.0.55\"|| header=\"Resin/4.0.55\"||banner=\"Resin/4.0.56\"|| header=\"Resin/4.0.56\"", "GobyQuery": "banner=\"Resin/4.0.52\"|| header=\"Resin/4.0.52\"||banner=\"Resin/4.0.53\"|| header=\"Resin/4.0.53\"||banner=\"Resin/4.0.54\"|| header=\"Resin/4.0.54\"||banner=\"Resin/4.0.55\"|| header=\"Resin/4.0.55\"||banner=\"Resin/4.0.56\"|| header=\"Resin/4.0.56\"", "Level": "2", "Impact": "

Resin server version 4.0.52 to 4.0.56 has a directory traversal vulnerability. Attackers can use; to read web configuration files to take over the system further.

", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://caucho.com

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

", "Translation": { "CN": { "Name": "Caucho Resin 服务器 4.0.52 4.0.56 版本目录遍历漏洞", "VulType": ["目录遍历"], "Tags": ["目录遍历"], "Description": "

Resin是Caucho的Web服务器和Java应用程序服务器。

Resin服务器4.0.52至4.0.56版本存在目录遍历漏洞。攻击者可利用;来读取web配置文件进一步接管系统。

", "Impact": "

Resin服务器4.0.52至4.0.56版本存在目录遍历漏洞。攻击者可利用;来读取web配置文件进一步接管系统。

", "Product": "Caucho Resin", "Recommendation": "

⼚商已发布了漏洞修复程序,请及时关注更新: https://caucho.com

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、如⾮必要,禁⽌公⽹访问该系统。

" }, "EN": { "Name": "Caucho Resin 4.0.52 4.0.56 Directory Traversal", "VulType": ["dir-traversal"], "Tags": ["dir-traversal"], "Description": "

Resin is Caucho's web server and Java application server.

Resin server version 4.0.52 to 4.0.56 has a directory traversal vulnerability. Attackers can use; to read web configuration files to take over the system further.

", "Impact": "

Resin server version 4.0.52 to 4.0.56 has a directory traversal vulnerability. Attackers can use; to read web configuration files to take over the system further.

", "Product": "Caucho Resin", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://caucho.com

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

" } }, "References": [ "https://fofa.so" ], "HasExp": true, "ExpParams": [ { "name": "filepath", "type": "input", "value": "/WEB-INF/resin-web.xml" } ], "ExpTips": null, "ScanSteps": null, "Tags": [ "dir-traversal" ], "VulType": [ "dir-traversal" ], "CVEIDs": [ "" ], "CVSSScore": "6.5", "AttackSurfaces": { "Application": null, "Support": null, "Service": ["Caucho Resin"], "System": null, "Hardware": null }, "CNNVD": [ "" ], "CNVD": [ "" ] }