Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Snoop Servlet path disclosure


Vulnerability Assessment Details

Snoop Servlet path disclosure

Vulnerability Assessment Summary
Attempts to enumerate physical path

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is affected by an information disclosure flaw.

Description :

This script attempts to enumerate the actual physical path of the
servlet classes by requesting a version of 'snoopservlet' which is
missing required classes. A possible hacker, gaining information about the
actual physical layout of the file system, can use the information in
crafting more complex attacks.

Solution :

If not required, uninstall the default applications.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

HP 250Data Terminal for HP 250 or HP 260 Mainframe 2622D
$325.0
HP 250Data Terminal for HP 250 or HP 260 Mainframe 2622D pictureHewlett Packard 3000 Series 58 Business Mainframe Computer System - 32558A
$3800.0
Hewlett Packard 3000 Series 58 Business Mainframe Computer System - 32558A pictureNCR Class 6081 mainframe mod 0503-0090 (circa 1960) with 4 monitors, 2 printers
$700.0
NCR Class 6081 mainframe mod  0503-0090 (circa 1960) with 4 monitors, 2 printers pictureIBM Vintage Mainframe Computer with Options 9370 or AS400
$1710.0
IBM Vintage Mainframe Computer with Options 9370 or AS400 picture


Discussions

No Discussions have been posted on this vulnerability.