脚本宝典收集整理的这篇文章主要介绍了IBM WebSphere源代码暴露漏洞,脚本宝典觉得挺不错的,现在分享给大家,也给大家做个参考。
bugtraq id 1500
class Access Validation Error
cve GENERIC-MAP-NOMATCH
remote Yes
local Yes
p
ublished July 24, 2000
updated July 24, 2000
vulnerable IBM Websphere Application Server 3.0.21
- Sun
solaris 8.0
- Microsoft Windows NT 4.0
- Linux kernel 2.
3.x- IBM
aiX 4.3
IBM Websphere Application Server 3.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
IBM Websphere Application Server 2.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
Certain versions of the IBM WebSphere application server ship w
ITh a vulnerability
which allows malicious users to view the source of any document which resides in the web document root directory.
This is possible via a flaw which allows a default servlet (different servlets are used to parse different ty
PEs of content, JHT
ML, HTMl, JSP, etc.) This default servlet will dis
play the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.
The Foundstone, Inc. advisory which cove
red this
PRoblem detailed the following method of verifying the vulnerability - full text of this advisory is available in the 'Credit' section of this entry:
"It is easy to verify this vulnerability for a given @R_
512_2663@tem. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without b
eing
parsed or compiled. For ex
ample if the URL for a file "lo
gin.jsp" is:
http://site.running.websphere/
LOGin.jsp
then accessing
http://site.running.websphere/servlet/file/login.jsp
would cause the unparsed contents of the file to show up in the web
browser."
脚本宝典总结
以上是脚本宝典为你收集整理的IBM WebSphere源代码暴露漏洞全部内容,希望文章能够帮你解决IBM WebSphere源代码暴露漏洞所遇到的问题。
如果觉得脚本宝典网站内容还不错,欢迎将脚本宝典推荐好友。
本图文内容来源于网友网络收集整理提供,作为学习参考使用,版权属于原作者。
如您有任何意见或建议可联系处理。小编QQ:384754419,请注明来意。