Overview
A directory traversal vulnerability exists in webMathematica.
Description
webMathematica provides a way to offer access to Mathematica applications via a web browser interface. For example, one can deploy calculators, problem solvers, and other types of interactive content over the web. By sending a specially crafted request to a web server running webMathematica, an attacker can view arbitrary files on the system. In order for the attack to be successful, the attacker must use the absolute pathname of the file being read. Vulnerable versions of webMathematica include 1.0.0 and 1.0.0.1. |
Impact
An attacker can view arbitrary files on the vulnerable host. As a result of viewing these files, an attacker may be able to gain additional access to the system (some of these files may be password files or other types of sensitive data). |
Solution
Replace your MSP servlet with a new one, available from http://support.wolfram.com/webmathematica/security/fileaccess.html. Please note that If you run webMathematica from Apache JServ, then you will need to update your images.class servlet as well. Wolfram Research is currently testing and validating a fixed version of the images.class servlet. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Wolfram Research, Inc. for reporting this vulnerability.
This document was written by Ian A Finlay.
Other Information
CVE IDs: | CVE-2002-0926 |
Severity Metric: | 15.75 |
Date Public: | 2002-06-17 |
Date First Published: | 2002-06-18 |
Date Last Updated: | 2002-06-18 19:11 UTC |
Document Revision: | 26 |