Exploit Apache Tomcat < 5.5.17 - Remote Directory Listing

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
2061
Проверка EDB
  1. Пройдено
Автор
SCANALERT SECURITY
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
N/A
Дата публикации
2006-07-23
Код:
ScanAlert Security Advisory - http://www.scanalert.com

Directory Listing in Apache Tomcat 5.x.x

Date: 07/21/2006
Vendor: Apache
Package: Tomcat
Versions: 5.x.x (5.0.28, 5.5.12, 5.5.9, and 5.5.7 . Confirmed)
Credit: ScanAlert.s Enterprise Services Team.

Overview:
Apache Tomcat is the servlet container that is used in the official Reference Implementation 
for the Java Servlet and JavaServer Pages technologies.

Vulnerabilities:
Apache Tomcat can be forced to reveal a complete directory listing for any directory by requesting 
a mapped file extension prepended with a semicolon, a reserved character. The file does not need to exist.

Examples:
http://www.sitexyz.com/;index.jsp
http://www.sitexyz.com/help/;help.do

# milw0rm.com [2006-07-23]
 
Источник
www.exploit-db.com

Похожие темы