HTTP: Apache Tomcat .jsp Interpreted as HTML Source Disclosure
This signature detects attempts to exploit a known vulnerability in Apache Tomcat. Apache Tomcat 3.3.1 and earlier are vulnerable. Attackers can send a maliciously crafted URL to cause the server to parse a .jsp file as HTML code and display the JSP code, allowing attackers to retrieve normally unaccessable files.
Extended Description
Apache Tomcat is prone to a directory/file disclosure vulnerability when used with JDK 1.3.1 or earlier. It has been reported that remote attackers may view directory contents (even when an 'index.html' or other welcome file). It is also possible for remote attackers to disclose the contents of files. This vulnerability is due to improper handling of null bytes (%00) and backslash ('\') characters in requests for web resources.
Affected Products
Apache_software_foundation tomcat
References
BugTraq: 6721
CVE: CVE-2003-0042
URL: http://archives.neohapsis.com/archives/bugtraq/2003-01/0360.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Apache_software_foundation
5.0