![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.117708 |
Kategorie: | Web Servers |
Titel: | '/;/WEB-INF/' Information Disclosure Vulnerability (HTTP) |
Zusammenfassung: | Various application or web servers / products are prone to an; information disclosure vulnerability. |
Beschreibung: | Summary: Various application or web servers / products are prone to an information disclosure vulnerability. Vulnerability Insight: The servlet specification prohibits servlet containers from serving resources in the '/WEB-INF' and '/META-INF' directories of a web application archive directly to clients. This means that URLs like: http://example.com/WEB-INF/web.xml will return an error message, rather than the contents of the deployment descriptor. However, some application or web servers / products are prone to a vulnerability that exposes this information if the client requests a URL like this instead: http://example.com/ http://example.com/ (note the ' Vulnerability Impact: Based on the information provided in this file an attacker might be able to gather additional info and/or sensitive data about the application / the application / web server. Affected Software/OS: The following products are known to be affected: - CVE-2021-26085: Atlassian Confluence - CVE-2021-26086: Atlassian Jira Server - CVE-2021-44138: Caucho Resin version 4.0.52 through 4.0.56 - CVE-2022-31656: VMware Workspace ONE Access, Identity Manager and Realize Automation Other products might be affected as well. Solution: The following vendor fixes are known: - Update Atlassian Confluence to the latest available version - Update Atlassian Jira Server to the latest available version - Update Caucho Resin to the latest available version For other products please contact the vendor for more information on possible fixes. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-26085 http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html https://jira.atlassian.com/browse/CONFSERVER-67893 Common Vulnerability Exposure (CVE) ID: CVE-2021-26086 http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html https://jira.atlassian.com/browse/JRASERVER-72695 Common Vulnerability Exposure (CVE) ID: CVE-2021-44138 https://github.com/maybe-why-not/reponame/issues/2 Common Vulnerability Exposure (CVE) ID: CVE-2022-31656 https://www.vmware.com/security/advisories/VMSA-2022-0021.html |
Copyright | Copyright (C) 2021 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |