search menu icon-carat-right cmu-wordmark

CERT Coordination Center

webMathematica discloses the contents of arbitrary files when file is requested using the absolute path

Vulnerability Note VU#664323

Original Release Date: 2002-06-18 | Last Revised: 2002-06-18


A directory traversal vulnerability exists in webMathematica.


webMathematica provides a way to offer access to Mathematica applications via a web browser interface. For example, one can deploy calculators, problem solvers, and other types of interactive content over the web.

By sending a specially crafted request to a web server running webMathematica, an attacker can view arbitrary files on the system. In order for the attack to be successful, the attacker must use the absolute pathname of the file being read. Vulnerable versions of webMathematica include 1.0.0 and


An attacker can view arbitrary files on the vulnerable host. As a result of viewing these files, an attacker may be able to gain additional access to the system (some of these files may be password files or other types of sensitive data).


Replace your MSP servlet with a new one, available from Please note that If you run webMathematica from Apache JServ, then you will need to update your images.class servlet as well. Wolfram Research is currently testing and validating a fixed version of the images.class servlet.

Vendor Information


Wolfram Research Inc. Affected

Updated:  June 18, 2002



Vendor Statement

Please see

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Wolfram Research, Inc. for reporting this vulnerability.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-0926
Severity Metric: 15.75
Date Public: 2002-06-17
Date First Published: 2002-06-18
Date Last Updated: 2002-06-18 19:11 UTC
Document Revision: 26

Sponsored by CISA.