Advisory Details

March 28th, 2011

Zend Server Java Bridge Design Flaw Remote Code Execution Vulnerability

ZDI-11-113
ZDI-CAN-928

CVE ID
CVSS SCORE 10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)
AFFECTED VENDORS Zend
AFFECTED PRODUCTS Zend Server
TIPPINGPOINT™ IPS CUSTOMER PROTECTION TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10610. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Zend Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the Zend Java Bridge v3.1 component of the Zend Server framework. The javamw.jar service accepts TCP requests on port 10001 by default. With nothing more than the knowledge of the proprietary communication protocol used by the Zend Server Java Bridge, it is possible to send arbitrary Java code to javamw.jar service and remotely execute these commands under the context of the user running the web server process.

VENDOR RESPONSE Zend states:

Zend Server Java Bridge Hotfix
http://www.zend.com/en/products/server/downloads

Mention and notification can also be found here:
http://www.zend.com/en/products/server/updates


DISCLOSURE TIMELINE
  • 2010-09-30 - Vulnerability reported to vendor
  • 2011-03-28 - Coordinated public release of advisory
CREDIT Luca Carettoni
BACK TO ADVISORIES