GNUJSP文件泄露漏洞

GNUJSP文件泄露漏洞

漏洞ID 1106618 漏洞类型 配置错误
发布时间 2002-02-19 更新时间 2005-05-02
图片[1]-GNUJSP文件泄露漏洞-安全小百科CVE编号 CVE-2002-0300
图片[2]-GNUJSP文件泄露漏洞-安全小百科CNNVD-ID CNNVD-200205-110
漏洞平台 Multiple CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/21295
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200205-110
|漏洞详情
Gnujsp1.0.0和1.0.1版本存在漏洞。远程攻击者可以通过直接向gnujsp伺服程序请求目标文件来列出目录,读取某些脚本的源代码并绕过访问限制,其中,该伺服程序工作不受Jserv限制,并且不处理请求文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/4125/info

GNUJSP is a freely available, open-source implementation of Sun's Java Server Pages. It will run on most Unix and Linux variants, as well as Microsoft Windows NT/2000 operating systems.

It has been reported that a remote attacker may disclose the contents of directories via a specially crafted web request. This may be exploited to list directories, read the contents of arbitrary web-readable files, and disclose script source code. The attacker simply appends the name of the directory and/or file to be disclosed to a web request for /servlets/gnujsp/.

It should be noted that this may allow an attacker to circumvent .htaccess files.

This issue may be the result of a configuration error. 

http://site/servlets/gnujsp/[dirname]/[file]
|参考资料

来源:DEBIAN
名称:DSA-114
链接:http://www.debian.org/security/2002/dsa-114
来源:BUGTRAQ
名称:20020219gnujsp:dir-andscript-disclosure
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=101415804625292&w;=2
来源:BID
名称:4125
链接:http://www.securityfocus.com/bid/4125
来源:XF
名称:gnujsp-jserv-information-disclosure(8240)
链接:http://www.iss.net/security_center/static/8240.php
来源:BUGTRAQ
名称:20020220Re:gnujsp:dir-andscript-disclosure
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=101422432123898&w;=2

相关推荐: BSD-Games 2.x – Monop Player Name Local Buffer Overrun (2)

BSD-Games 2.x – Monop Player Name Local Buffer Overrun (2) 漏洞ID 1054124 漏洞类型 发布时间 2003-08-25 更新时间 2003-08-25 CVE编号 N/A CNNVD-ID N/…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享