|
![]() |
名片设计 CorelDRAW Illustrator AuotoCAD Painter 其他软件 Photoshop Fireworks Flash |
|
bugtraq id 1500 class Access Validation Error cve GENERIC-MAP-NOMATCH remote Yes local Yes published July 24, 2000 updated July 24, 2000 vulnerable IBM Websphere Application Server 3.0.21 - Sun Solaris 8.0 - Microsoft Windows NT 4.0 - Linux kernel 2.3.x - IBM AIX 4.3 IBM Websphere Application Server 3.0 - Sun Solaris 8.0 - Novell Netware 5.0 - Microsoft Windows NT 4.0 - Linux kernel 2.3.x - IBM AIX 4.3 IBM Websphere Application Server 2.0 - Sun Solaris 8.0 - Novell Netware 5.0 - Microsoft Windows NT 4.0 - Linux kernel 2.3.x - IBM AIX 4.3 Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory. This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user. The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability - full text of this advisory is available in the \\'Credit\\' section of this entry: "It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being parsed or compiled. For example if the URL for a file "login.jsp" is: http://site.running.websphere/login.jsp then accessing http://site.running.websphere/servlet/file/login.jsp would cause the unparsed contents of the file to show up in the web browser." 返回类别: 教程 上一教程: ASP+与JSP之间的抉择 下一教程: 在win2000中安装JSP 您可以阅读与"IBM WebSphere源代码暴露漏洞 "相关的教程: · 多中WEB服务器的通用JSp源代码暴露漏洞 · IBM WebSphere Application Server 3.0.2 存在暴露源代码漏洞 · Unify eWave ServletExec 泄露jsp源代码漏洞 · BEA WebLogic 暴露源代码漏洞 · IBM HTTP Server 远程溢出漏洞 |
![]() ![]() |
快精灵印艺坊 版权所有 |
首页![]() ![]() ![]() ![]() ![]() ![]() ![]() |