Oracle iPlanet Web Server (formerly Sun Java System Web Server or Sun ONE Web Server) 6.1 before SP12, and 7.0 through Update 6, when running on Windows, allows remote attackers to read arbitrary JSP files via an alternate data stream syntax, as demonstrated by a .jsp::$DATA URI.
References
Link | Resource |
---|---|
http://isowarez.de/SunOne_Webserver.txt | Exploit |
http://jvn.jp/en/jp/JVN47124169/index.html | |
http://jvndb.jvn.jp/jvndb/JVNDB-2009-002069 | |
http://secunia.com/advisories/35701 | Vendor Advisory |
http://securitytracker.com/id?1022511 | Exploit |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-266429-1 | Vendor Advisory |
http://www.osvdb.org/55655 | |
http://www.vupen.com/english/advisories/2009/1786 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-07-13 17:30
Updated : 2024-02-04 17:33
NVD link : CVE-2009-2445
Mitre link : CVE-2009-2445
CVE.ORG link : CVE-2009-2445
JSON object : View
Products Affected
sun
- java_system_web_server
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor