Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> WEB-INF folder accessible

Vulnerability Assessment Details

WEB-INF folder accessible

Vulnerability Assessment Summary
Tests for WEB-INF folder access

Detailed Explanation for this Vulnerability Assessment
This vulnerability affects the Win32 versions of multiple j2ee servlet
containers / application servers. By making a particular request to the
servers in question it is possible to retrieve files located under
the 'WEB-INF' directory.

For example:



Contact your vendor for the appropriate patch.

Network Security Threat Level: Medium

Networks Security ID: 5119

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Matt Moore

Cables, Connectors

Toshiba Mq01acf050 - 500gb 7200rpm 2.5" Sata Hd 500 GB
Toshiba Mq01acf050 - 500gb 7200rpm 2.5*NEW Toshiba 2.5" SATA 500GB Hard Drive 7200RPM 0C7F2G-Pulled from DELL laptops
*NEW Toshiba 2.5SanDisk - Ultra 512GB Internal SATA Solid State Drive
SanDisk - Ultra 512GB Internal SATA Solid State Drive pictureHitachi Ultrastar 7K3000 3TB 3.5" Internal Hard Drive 7200RPM - HUA723030ALA641
Hitachi Ultrastar 7K3000 3TB 3.5


No Discussions have been posted on this vulnerability.