Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.10852
Category:Web application abuses
Title:Oracle 9iAS Jsp Source File Reading Information Disclosure Vulnerability - Active Check
Summary:In a default installation of Oracle 9iAS it is possible to read; the source of JSP files.
Description:Summary:
In a default installation of Oracle 9iAS it is possible to read
the source of JSP files.

Vulnerability Insight:
When a JSP is requested it is compiled 'on the fly' and the
resulting HTML page is returned to the user. Oracle 9iAS uses a folder to hold the intermediate
files during compilation. These files are created in the same folder in which the .JSP page
resides.

Hence, it is possible to access the .java and compiled .class files for a given JSP page.

Solution:
Edit httpd.conf to disallow access to the _pages folder.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2002-0565
BugTraq ID: 4034
http://www.securityfocus.com/bid/4034
Bugtraq: 20020206 JSP translation file access under Oracle 9iAS (Google Search)
http://marc.info/?l=bugtraq&m=101301440005580&w=2
http://www.cert.org/advisories/CA-2002-08.html
CERT/CC vulnerability note: VU#547459
http://www.kb.cert.org/vuls/id/547459
XForce ISS Database: oracle-appserver-oraclejsp-view-info(8100)
https://exchange.xforce.ibmcloud.com/vulnerabilities/8100
CopyrightCopyright (C) 2002 Matt Moore

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.