JRun 3.0 through 4.0 allows remote attackers to read JSP source code via an encoded null byte in an HTTP GET request, which causes the server to send the .JSP file unparsed.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0138.html - | |
References | () http://online.securityfocus.com/archive/1/280062 - | |
References | () http://www.iss.net/security_center/static/9459.php - Patch, Vendor Advisory | |
References | () http://www.macromedia.com/v1/handlers/index.cfm?ID=23164 - | |
References | () http://www.osvdb.org/5028 - | |
References | () http://www.securityfocus.com/bid/5134 - Exploit, Patch, Vendor Advisory |
Information
Published : 2002-10-04 04:00
Updated : 2024-11-20 23:40
NVD link : CVE-2002-1025
Mitre link : CVE-2002-1025
CVE.ORG link : CVE-2002-1025
JSON object : View
Products Affected
macromedia
- jrun
CWE