IBM WebSphere源代碼暴露漏洞
更新時(shí)間:2006年10月13日 00:00:00 作者:
bugtraq id 1500
class Access Validation Error
cve GENERIC-MAP-NOMATCH
remote Yes
local Yes
published July 24, 2000
updated July 24, 2000
vulnerable IBM Websphere Application Server 3.0.21
- Sun Solaris 8.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
IBM Websphere Application Server 3.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
IBM Websphere Application Server 2.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.
This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.
The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability - full text of this advisory is available in the 'Credit' section of this entry:
"It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being
parsed or compiled. For example if the URL for a file "login.jsp" is:
http://site.running.websphere/login.jsp
then accessing
http://site.running.websphere/servlet/file/login.jsp
would cause the unparsed contents of the file to show up in the web browser."
class Access Validation Error
cve GENERIC-MAP-NOMATCH
remote Yes
local Yes
published July 24, 2000
updated July 24, 2000
vulnerable IBM Websphere Application Server 3.0.21
- Sun Solaris 8.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
IBM Websphere Application Server 3.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
IBM Websphere Application Server 2.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.
This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.
The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability - full text of this advisory is available in the 'Credit' section of this entry:
"It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being
parsed or compiled. For example if the URL for a file "login.jsp" is:
http://site.running.websphere/login.jsp
then accessing
http://site.running.websphere/servlet/file/login.jsp
would cause the unparsed contents of the file to show up in the web browser."
相關(guān)文章
jsp base標(biāo)簽與meta標(biāo)簽學(xué)習(xí)小結(jié)
jsp中的base標(biāo)簽與meta標(biāo)簽對(duì)于一些新手朋友們來(lái)說(shuō)還是有些陌生,下文整理了一些,不會(huì)的朋友可以參考下2013-11-11web開發(fā)中添加數(shù)據(jù)源實(shí)現(xiàn)思路
這篇文章主要介紹了 web開發(fā)中添加數(shù)據(jù)源實(shí)現(xiàn)思路的相關(guān)資料,需要的朋友可以參考下2017-04-04Apache FileUpload的兩種上傳方式介紹及應(yīng)用
本文為大家介紹下FileUpload的兩種上傳方式:Traditional API上傳方式/Streaming API上傳方式,感興趣的朋友可以參考下哈,希望可以幫助到你2013-03-03JSP spring boot / cloud 使用filter防止XSS
這篇文章主要介紹了JSP spring boot / cloud 使用filter防止XSS的相關(guān)資料,需要的朋友可以參考下2017-06-06JSP用過(guò)濾器解決request getParameter中文亂碼問題
在服務(wù)器端用request.getParameter()讀取參數(shù)時(shí),很容易出現(xiàn)中文亂碼現(xiàn)象,下面是JSP用過(guò)濾器解決request中文亂碼問題的具體實(shí)現(xiàn)2014-09-09