| VID |
22160 |
| Severity |
30 |
| Port |
8080 |
| Protocol |
TCP |
| Class |
Servlet |
| Detailed Description |
The Apache Tomcat server has a JSP source revealing vulnerability via a default servlet. Apache Tomcat is a Java application server used with Apache HTTP Server to support JavaServer Pages (JSP) and Java servlets. Tomcat 4.0.4 and 4.1.10 and earlier are vulnerable to source code exposure by using the default servlet org.apache.catalina.servlets.DefaultServlet. A remote attacker can send a specially-crafted URL request for a known JavaServer Pages (JSP) to bypass protection and obtain the source code of the requested JSP page, and possibly obtain database passwords and file names.
For example to see the JSP source of Tomcat 4.1.10 admin application: http://localhost:8080/admin/index.jsp Execute http://localhost:8080/admin/servlet/org.apache.catalina.servlets.DefaultServlet/index.jsp
* Platforms Affected: Tomcat version 4.0.4 and earlier Tomcat version 4.1.10 and earlier UNIX/Linux Any version Windows Any version
* References: http://online.securityfocus.com/bid/5786 http://www.iss.net/security_center/static/10175.php |
| Recommendation |
For Apache Tomcat 4.0.x: Apply the patch for this vulnerability, available from the Jakarta Web site, http://jakarta.apache.org/builds/jakarta-tomcat-4.0/release/
For Apache Tomcat 4.1.x: Upgrade to the latest releases (4.1.12 or later), available from the Jakarta Web site, http://jakarta.apache.org/builds/jakarta-tomcat-4.0/release/ |
| Related URL |
CVE-2002-1148 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|