----------------------------------------------------------------------

Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/

----------------------------------------------------------------------

TITLE:
webMethods Glue "resource" Directory Traversal Vulnerability

SECUNIA ADVISORY ID:
SA24933

VERIFY ADVISORY:
http://secunia.com/advisories/24933/

CRITICAL:
Moderately critical

IMPACT:
Exposure of system information, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
webMethods Glue 6.x
http://secunia.com/product/13974/
webMethods Glue 5.x
http://secunia.com/product/13976/
webMethods Glue 4.x
http://secunia.com/product/13975/

DESCRIPTION:
Patrick Webster has reported a vulnerability in webMethods Glue,
which can be exploited by malicious people to disclose sensitive
information.

Input passed to the "resource" parameter via the /console URL is not
properly sanitised before being used to display files. This can be
exploited to display arbitrary files via directory traversal
attacks.

The vulnerability reportedly affects versions 4.x, 5.x, and 6.x.

SOLUTION:
The vendor recommends editing various configuration files, blocking
access to the /console URL, or running the server in "chroot"
environment. Please see the vendor's advisory for details.

A fix for version 6.5.1 will reportedly be made available by May 1.
For other versions, contact webMethods Technical Services.

PROVIDED AND/OR DISCOVERED BY:
Patrick Webster

ORIGINAL ADVISORY:
Security Alerts forum in webMethods (requires registration):
https://advantage.webmethods.com/

http://www.aushack.com/advisories/200704-webmethods.txt

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------