Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Apache Tomcat source.jsp malformed request information disclosure


Vulnerability Assessment Details

Apache Tomcat source.jsp malformed request information disclosure

Vulnerability Assessment Summary
Checks for the Tomcat source.jsp malformed request vulnerability

Detailed Explanation for this Vulnerability Assessment

The source.jsp file, distributed with Apache Tomcat server, will
disclose information when passed a malformed request. As a result,
information such as the web root path and directory listings could
be obtained.

Example: http://target/examples/jsp/source.jsp?? - reveals the web root
http://target/examples/jsp/source.jsp?/jsp/ - reveals the contents of the jsp directory

See also: http://www.securityfocus.com/bid/4876

Solution: Remove default files from the web server

Network Security Threat Level: Medium

Networks Security ID: 4876

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Kyger

Cables, Connectors

HighPoint RocketRAID 1820A RAID Controller PCI-X 8 Channel SATA
$36.09
HighPoint RocketRAID 1820A RAID Controller PCI-X 8 Channel SATA pictureDELL POWEREDGE M620 MINI BLADE PERC H710 SAS 6GB/S RAID CONTROLLER CARD 062P9H
$119.09
DELL POWEREDGE M620 MINI BLADE PERC H710 SAS 6GB/S RAID CONTROLLER CARD 062P9H pictureFalcon Northwest TIKI 4.0GHz i7 4970k, 16GB RAM, 2x SSD RAID 0 Gaming PC
$2500.0
Falcon Northwest TIKI 4.0GHz i7 4970k, 16GB RAM, 2x SSD RAID 0 Gaming PC pictureSyba SY-ENC35028 USB 3.0 Dual 3.5" SATA Drive RAID Enclosure, Black
$44.52
Syba SY-ENC35028 USB 3.0 Dual 3.5


Discussions

No Discussions have been posted on this vulnerability.