Exploit Tomcat 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20719
Проверка EDB
  1. Пройдено
Автор
SVERRE H. HUSEBY
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
null
Дата публикации
2001-03-28
Код:
source: https://www.securityfocus.com/bid/2527/info


BEA Systems WebLogic Server is an enterprise level web and wireless application server.

Tomcat can be used together with the Apache web server or a stand alone server for Java Servlets and Java Pages. Tomcat ships with a built in web server.

Tomcat and WebLogic's inbuilt webserver will return the source code of JSP files when an HTTP request contains URL encoded replacements for characters in the filename.

If successfully exploited this vulnerability could lead to the disclosure of sensitive information contained within JSP pages. This information may assist in further attacks against the host.

WebLogic:

http://www.example.com/index.js%70

Tomcat:

http://www.example.com/examples/jsp/num/numguess.js%70

The following variant URL for Tomcat has been provided by lovehacker <[email protected]>:

http://www.example.com/examples/snp/snoop%252ejsp
 
Источник
www.exploit-db.com

Похожие темы