Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.11037
Categoría:Web Servers
Título:'/WEB-INF./' Information Disclosure Vulnerability (HTTP)
Resumen:Various application or web servers / products are prone to an; information disclosure vulnerability.
Descripción:Summary:
Various application or web servers / products are prone to an
information disclosure vulnerability.

Vulnerability Insight:
The servlet specification prohibits servlet containers from
serving resources in the '/WEB-INF' and '/META-INF' directories of a web application archive
directly to clients.

This means that URLs like:

http://example.com/WEB-INF/web.xml

will return an error message, rather than the contents of the deployment descriptor.

However, some application or web servers / products are prone to a vulnerability that exposes this
information if the client requests a URL like this instead:

http://example.com/WEB-INF./web.xml

http://example.com/web-inf./web.xml

(note the trailing dot ('.') after 'WEB-INF').

Vulnerability Impact:
Based on the information provided in this file an attacker might
be able to gather additional info and / or sensitive data about the application / the application
/ web server.

Affected Software/OS:
The following products are known to be affected:

- Sybase EA Server 4.0

- OC4J - Oracle Containers for J2EE

- Orion 1.5.3

- JRun 3.0, 3.1 and JRun 4 - Macromedia / Allaire JRun

- HPAS 8.0 - Hewlett Packard App Server

- Pramati 3.0 - Pramati App Server

- Jo - Jo Webserver

- WildFly (formerly JBoss Application Server) before 10.0.0.Final

- HPE B-Series SAN Network Advisor Software Running WildFly (formerly JBoss Application Server)

- VMware vCenter Server 5.1.x

Other products might be affected as well.

Solution:
The following vendor fixes are known:

- Update to EAServer 4.1 (also fixed in maintenance release for 3.6.1).

- Update to OC4J / 9iAS 9.0.2 or later.

- Update to Orion 1.5.3 or later.

- Cumulative Patch available for JRun 3.0, 3.1 / 4.0.

- Update to HPAS 8.0 Maintenance Pack 8 (MP8) or later.

- Update to Pramati 3.0 Service Pack 1 or later.

- Update to Jo Webserver 1.0b7 or later.

- Update WildFly to version 10.0.0.Final or later.

For other products please contact the vendor for more information on possible fixes.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2002-1855
BugTraq ID: 5119
http://www.securityfocus.com/bid/5119
Bugtraq: 20020628 wp-02-0002: 'WEB-INF' Folder accessible in Multiple Web Application Servers (Google Search)
http://online.securityfocus.com/archive/1/279582
http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt
http://www.iss.net/security_center/static/9446.php
Common Vulnerability Exposure (CVE) ID: CVE-2002-1856
Common Vulnerability Exposure (CVE) ID: CVE-2002-1857
Common Vulnerability Exposure (CVE) ID: CVE-2002-1858
Common Vulnerability Exposure (CVE) ID: CVE-2002-1859
Common Vulnerability Exposure (CVE) ID: CVE-2002-1860
Common Vulnerability Exposure (CVE) ID: CVE-2002-1861
Common Vulnerability Exposure (CVE) ID: CVE-2016-0793
39573
https://www.exploit-db.com/exploits/39573/
http://packetstormsecurity.com/files/136323/Wildfly-Filter-Restriction-Bypass-Information-Disclosure.html
https://bugzilla.redhat.com/show_bug.cgi?id=1305937
https://security.netapp.com/advisory/ntap-20180215-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03784en_us
CopyrightCopyright (C) 2002 Matt Moore / 2021 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.