apache tomcat的oop servlet漏洞_JSP技巧_黑客防线网安服务器维护基地--Powered by WWW.RONGSEN.COM.CN

apache tomcat的oop servlet漏洞

作者:黑客防线网安JSP教程基地 来源:黑客防线网安JSP教程基地 浏览次数:0

本篇关键词:漏洞thiswhichWindows
黑客防线网安网讯:bugtraq id 1500   class Access Validation Error   cve GENERIC-MAP-NOMATCH   remote Yes   local Yes   published July 24, 2000   updated July 24, 2000   vulnerable ...
bugtraq id 1500
   class Access Validation Error
   cve GENERIC-MAP-NOMATCH
   remote Yes
   local Yes
   published July 24, 2000
   updated July 24, 2000
   vulnerable IBM Websphere Application Server 3.0.21
   - Sun Solaris 8.0
   - Microsoft Windows NT 4.0
   - Linux kernel 2.3.x
   - IBM AIX 4.3
   IBM Websphere Application Server 3.0
   - Sun Solaris 8.0
   - Novell Netware 5.0
   - Microsoft Windows NT 4.0
   - Linux kernel 2.3.x
   - IBM AIX 4.3
   IBM Websphere Application Server 2.0
   - Sun Solaris 8.0
   - Novell Netware 5.0
   - Microsoft Windows NT 4.0
   - Linux kernel 2.3.x
   - IBM AIX 4.3
  
   Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.
  
   This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.
  
   The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability - full text of this advisory is available in the 'Credit' section of this entry:
  
   "It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being
   parsed or compiled. For example if the URL for a file "login.jsp" is:
  
   http://site.running.websphere/login.jsp
  
   then accessing
  
   http://site.running.websphere/servlet/file/login.jsp
  
   would cause the unparsed contents of the file to show up in the web browser."
  
  
    黑客防线网安服务器维护方案本篇连接:http://www.rongsen.com.cn/show-16598-1.html
网站维护教程更新时间:2012-04-07 00:43:28  【打印此页】  【关闭
我要申请本站N点 | 黑客防线官网 |  
专业服务器维护及网站维护手工安全搭建环境,网站安全加固服务。黑客防线网安服务器维护基地招商进行中!QQ:29769479

footer  footer  footer  footer