![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11658 |
Category: | CGI abuses |
Title: | SunONE Application Server source disclosure |
Summary: | NOSUMMARY |
Description: | Description: It is possible to make the remote web server disclose the source code of its JSP pages by requesting the pages with a different case (ie: filename.JSP instead of filename.jsp). An attacker may use this flaw to get the source code of your CGIs and possibly obtain passwords and other relevant information about this host. Solution : None at this time Risk factor : High |
Cross-Ref: |
BugTraq ID: 7709 Common Vulnerability Exposure (CVE) ID: CVE-2003-0411 http://www.securityfocus.com/bid/7709 Bugtraq: 20030526 Multiple Vulnerabilities in Sun-One Application Server (Google Search) http://marc.info/?l=bugtraq&m=105409846029475&w=2 Computer Incident Advisory Center Bulletin: N-103 http://www.ciac.org/ciac/bulletins/n-103.shtml http://www.spidynamics.com/sunone_alert.html http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000610.1-1 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F55221&zone_32=category%3Asecurity http://www.iss.net/security_center/static/12093.php |
Copyright | This script is Copyright (C) 2003 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |