IBM WebSphere源代码暴露漏洞_JSP教程-查字典教程网
IBM WebSphere源代码暴露漏洞
IBM WebSphere源代码暴露漏洞
发布时间:2016-12-29 来源:查字典编辑
摘要:bugtraqid1500classAccessValidationErrorcveGENERIC-MAP-NOMATCHremoteYes...

bugtraq id 1500

class Access Validation Error

cve GENERIC-MAP-NOMATCH

remote Yes

local Yes

published July 24, 2000

updated July 24, 2000

vulnerable IBM Websphere Application Server 3.0.21

- Sun Solaris 8.0

- Microsoft Windows NT 4.0

- Linux kernel 2.3.x

- IBM AIX 4.3

IBM Websphere Application Server 3.0

- Sun Solaris 8.0

- Novell Netware 5.0

- Microsoft Windows NT 4.0

- Linux kernel 2.3.x

- IBM AIX 4.3

IBM Websphere Application Server 2.0

- Sun Solaris 8.0

- Novell Netware 5.0

- Microsoft Windows NT 4.0

- Linux kernel 2.3.x

- IBM AIX 4.3

Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.

This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.

The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability - full text of this advisory is available in the 'Credit' section of this entry:

"It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being

parsed or compiled. For example if the URL for a file "login.jsp" is:

http://site.running.websphere/login.jsp

then accessing

http://site.running.websphere/servlet/file/login.jsp

would cause the unparsed contents of the file to show up in the web browser."

相关阅读
推荐文章
猜你喜欢
附近的人在看
推荐阅读
拓展阅读
  • 大家都在看
  • 小编推荐
  • 猜你喜欢
  • 最新JSP教程学习
    热门JSP教程学习
    编程开发子分类