首页后端开发其他后端知识IBM WebSphere源代码暴露漏洞

IBM WebSphere源代码暴露漏洞

时间2024-02-07 19:28:03发布访客分类其他后端知识浏览490
导读:收集整理的这篇文章主要介绍了IBM WebSphere源代码暴露漏洞,觉得挺不错的,现在分享给大家,也给大家做个参考。 bugtraq id 1500 class Access Vali...
收集整理的这篇文章主要介绍了IBM WebSphere源代码暴露漏洞,觉得挺不错的,现在分享给大家,也给大家做个参考。 bugtraq id 1500
class Access Validation Error
cve GENERIC-MAP-NOMATCH
remote Yes
local Yes
published July 24, 2000
updated July 24, 2000
vulnerable IBM Websphere Application Server 3.0.21
- Sun solaris 8.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM aiX 4.3
IBM Websphere Application Server 3.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3
IBM Websphere Application Server 2.0
- Sun Solaris 8.0
- Novell Netware 5.0
- Microsoft Windows NT 4.0
- Linux kernel 2.3.x
- IBM AIX 4.3

Certain versions of the IBM WebSphere application server ship wITh a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.

This is possible via a flaw which allows a default servlet (different servlets are used to parse different tyPEs of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.

The Foundstone, Inc. advisory which covered this PRoblem detailed the following method of verifying the vulnerability - full text of this advisory is available in the 'Credit' section of this entry:

"It is easy to verify this vulnerability for a given System. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being
parsed or compiled. For example if the URL for a file "login.jsp" is:

http://site.running.websphere/LOGin.jsp

then accessing

http://site.running.websphere/servlet/file/login.jsp

would cause the unparsed contents of the file to show up in the web browser."

声明:本文内容由网友自发贡献,本站不承担相应法律责任。对本内容有异议或投诉,请联系2913721942#qq.com核实处理,我们将尽快回复您,谢谢合作!


若转载请注明出处: IBM WebSphere源代码暴露漏洞
本文地址: https://pptw.com/jishu/604460.html
jsp源码实例4(搜索引擎) jsp计数器代码

游客 回复需填写必要信息