Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Snoop Servlet path disclosure


Vulnerability Assessment Details

Snoop Servlet path disclosure

Vulnerability Assessment Summary
Attempts to enumerate physical path

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is affected by an information disclosure flaw.

Description :

This script attempts to enumerate the actual physical path of the
servlet classes by requesting a version of 'snoopservlet' which is
missing required classes. A possible hacker, gaining information about the
actual physical layout of the file system, can use the information in
crafting more complex attacks.

Solution :

If not required, uninstall the default applications.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

RAID Array 24TB (hardware RAID) Thunderbolt 2 -1000 MB/s - 8x3TB Enterprise HDDs
$400.0
RAID Array 24TB (hardware RAID) Thunderbolt 2 -1000 MB/s - 8x3TB Enterprise HDDs pictureLenovo Think Server RAID 720ix, 00LF083 AnyRAID Adapter with 03T8655
$269.0
Lenovo Think Server RAID 720ix, 00LF083 AnyRAID Adapter with 03T8655 pictureSyba SY-SA1622-2R 2-Port SATA RAID PCI Controller Card
$9.99
Syba SY-SA1622-2R 2-Port SATA RAID PCI Controller Card picture5X 40cm Serial ATA SATA 3 RAID Data HDD Hard Drive Disk Signal Cables Yellow_WK
$5.96
5X 40cm Serial ATA SATA 3 RAID Data HDD Hard Drive Disk Signal Cables Yellow_WK picture


Discussions

No Discussions have been posted on this vulnerability.