Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> WEB-INF folder accessible


Vulnerability Assessment Details

WEB-INF folder accessible

Vulnerability Assessment Summary
Tests for WEB-INF folder access

Detailed Explanation for this Vulnerability Assessment
This vulnerability affects the Win32 versions of multiple j2ee servlet
containers / application servers. By making a particular request to the
servers in question it is possible to retrieve files located under
the 'WEB-INF' directory.

For example:

www.someserver.com/WEB-INF./web.xml

or

www.someserver.com/WEB-INF./classes/MyServlet.class

Solution:

Contact your vendor for the appropriate patch.

Network Security Threat Level: Medium

Networks Security ID: 5119

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Matt Moore

Cables, Connectors

Tandberg Data 5100-NAS BizNAS R400 NAS Server - BRAND NEW
$369.94
Tandberg Data 5100-NAS BizNAS R400 NAS Server - BRAND NEW picture0J3740 DELL POWEREDGE 2650 SERVER VOLTAGE REGULATOR MODULE BOARD
$7.0
0J3740 DELL POWEREDGE 2650 SERVER VOLTAGE REGULATOR MODULE BOARD pictureNL9127RD64042-D21JSE NETLIST SERVER 1GB PC2100 RANDOM ACCESS MEMORY
$7.0
NL9127RD64042-D21JSE NETLIST SERVER 1GB PC2100 RANDOM ACCESS MEMORY pictureDell PowerEdge R510 2x L5640 2.26GHz 6 Core 32GB 12x 3TB 7.2K SAS PERC H700
$2550.0
Dell PowerEdge R510 2x L5640 2.26GHz 6 Core 32GB 12x 3TB 7.2K SAS PERC H700 picture


Discussions

No Discussions have been posted on this vulnerability.