欢迎光临
我们一直在努力

apache tomcat的snoop servlet漏洞 _jsp文摘

建站超值云服务器,限时71元/月

bugtraq id 1500
class Access Validation Error
cve GENERIC-MAP-NOMATCH
remote Yes
local Yes
published July 24, 2000
updated July 24, 2000
vulnerable IBM Websphere Application Server 3.0.21
– Sun Solaris 8.0
– Microsoft Windows NT 4.0
– Linux kernel 2.3.x
– IBM AIX 4.3
IBM Websphere Application Server 3.0
– Sun Solaris 8.0
– Novell Netware 5.0
– Microsoft Windows NT 4.0
– Linux kernel 2.3.x
– IBM AIX 4.3
IBM Websphere Application Server 2.0
– Sun Solaris 8.0
– Novell Netware 5.0
– Microsoft Windows NT 4.0
– Linux kernel 2.3.x
– IBM AIX 4.3

Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.

This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.

The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability – full text of this advisory is available in the Credit section of this entry:

"It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being
parsed or compiled. For example if the URL for a file "login.jsp" is:

http://site.running.websphere/login.jsp

then accessing

http://site.running.websphere/servlet/file/login.jsp

would cause the unparsed contents of the file to show up in the web browser."

赞(0)
版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com 特别注意:本站所有转载文章言论不代表本站观点! 本站所提供的图片等素材,版权归原作者所有,如需使用,请与原作者联系。未经允许不得转载:IDC资讯中心 » apache tomcat的snoop servlet漏洞 _jsp文摘
分享到: 更多 (0)

相关推荐

  • 暂无文章