![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.11037 |
Categoría: | Web Servers |
Título: | '/WEB-INF./' Information Disclosure Vulnerability (HTTP) |
Resumen: | Various application or web servers / products are prone to an; information disclosure vulnerability. |
Descripción: | Summary: Various application or web servers / products are prone to an information disclosure vulnerability. Vulnerability Insight: The servlet specification prohibits servlet containers from serving resources in the '/WEB-INF' and '/META-INF' directories of a web application archive directly to clients. This means that URLs like: http://example.com/WEB-INF/web.xml will return an error message, rather than the contents of the deployment descriptor. However, some application or web servers / products are prone to a vulnerability that exposes this information if the client requests a URL like this instead: http://example.com/WEB-INF./web.xml http://example.com/web-inf./web.xml (note the trailing dot ('.') after 'WEB-INF'). Vulnerability Impact: Based on the information provided in this file an attacker might be able to gather additional info and / or sensitive data about the application / the application / web server. Affected Software/OS: The following products are known to be affected: - Sybase EA Server 4.0 - OC4J - Oracle Containers for J2EE - Orion 1.5.3 - JRun 3.0, 3.1 and JRun 4 - Macromedia / Allaire JRun - HPAS 8.0 - Hewlett Packard App Server - Pramati 3.0 - Pramati App Server - Jo - Jo Webserver - WildFly (formerly JBoss Application Server) before 10.0.0.Final - HPE B-Series SAN Network Advisor Software Running WildFly (formerly JBoss Application Server) - VMware vCenter Server 5.1.x Other products might be affected as well. Solution: The following vendor fixes are known: - Update to EAServer 4.1 (also fixed in maintenance release for 3.6.1). - Update to OC4J / 9iAS 9.0.2 or later. - Update to Orion 1.5.3 or later. - Cumulative Patch available for JRun 3.0, 3.1 / 4.0. - Update to HPAS 8.0 Maintenance Pack 8 (MP8) or later. - Update to Pramati 3.0 Service Pack 1 or later. - Update to Jo Webserver 1.0b7 or later. - Update WildFly to version 10.0.0.Final or later. For other products please contact the vendor for more information on possible fixes. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-1855 BugTraq ID: 5119 http://www.securityfocus.com/bid/5119 Bugtraq: 20020628 wp-02-0002: 'WEB-INF' Folder accessible in Multiple Web Application Servers (Google Search) http://online.securityfocus.com/archive/1/279582 http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt http://www.iss.net/security_center/static/9446.php Common Vulnerability Exposure (CVE) ID: CVE-2002-1856 Common Vulnerability Exposure (CVE) ID: CVE-2002-1857 Common Vulnerability Exposure (CVE) ID: CVE-2002-1858 Common Vulnerability Exposure (CVE) ID: CVE-2002-1859 Common Vulnerability Exposure (CVE) ID: CVE-2002-1860 Common Vulnerability Exposure (CVE) ID: CVE-2002-1861 Common Vulnerability Exposure (CVE) ID: CVE-2016-0793 39573 https://www.exploit-db.com/exploits/39573/ http://packetstormsecurity.com/files/136323/Wildfly-Filter-Restriction-Bypass-Information-Disclosure.html https://bugzilla.redhat.com/show_bug.cgi?id=1305937 https://security.netapp.com/advisory/ntap-20180215-0001/ https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03784en_us |
Copyright | Copyright (C) 2002 Matt Moore / 2021 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |