Miggo Logo

CVE-2006-3936:
Alkacon OpenCms Exposes JSP Source Code

4

CVSS Score

Basic Information

EPSS Score
-
Published
5/1/2022
Updated
2/12/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:L/Au:S/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.opencms:opencms-coremaven< 6.2.26.2.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly identifies system/workplace/editors/editor.jsp as the entry point that processes the 'resource' parameter. The JSP's handling of this parameter appears to directly read and output file contents without: 1) verifying if the user should have access to the specified resource, 2) ensuring requested files are not server-side executable components (JSPs), and 3) validating path traversal attempts. This matches the CWE-200 pattern of exposing sensitive information through insufficient authorization checks. The patch in version 6.2.2 likely added validation for the resource parameter and access controls.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

`syst*m/workpl***/**itors/**itor.jsp` in *lk**on Op*n*ms ***or* *.*.* *llows r*mot* *ut**nti**t** us*rs to r*** t** sour** *o** o* *r*itr*ry JSP *il*s *y sp**i*yin* t** *il* in t** r*sour** p*r*m*t*r, *s **monstr*t** usin* `in**x.jsp`.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly i**nti*i*s syst*m/workpl***/**itors/**itor.jsp *s t** *ntry point t**t pro**ss*s t** 'r*sour**' p*r*m*t*r. T** JSP's **n*lin* o* t*is p*r*m*t*r *pp**rs to *ir**tly r*** *n* output *il* *ont*nts wit*out: *) v*r