HTTP: Apache Tomcat .jsp Interpreted as HTML Source Disclosure

This signature detects attempts to exploit a known vulnerability in Apache Tomcat. Apache Tomcat 3.3.1 and earlier are vulnerable. Attackers can send a maliciously crafted URL to cause the server to parse a .jsp file as HTML code and display the JSP code, allowing attackers to retrieve normally unaccessable files.

Extended Description

Apache Tomcat is prone to a directory/file disclosure vulnerability when used with JDK 1.3.1 or earlier. It has been reported that remote attackers may view directory contents (even when an 'index.html' or other welcome file). It is also possible for remote attackers to disclose the contents of files. This vulnerability is due to improper handling of null bytes (%00) and backslash ('\') characters in requests for web resources.

Affected Products

Apache_software_foundation tomcat

Short Name
HTTP:TOMCAT:JSP-AS-HTML
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
.jsp Apache CVE-2003-0042 Disclosure HTML Interpreted Source Tomcat as bid:6721
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Apache_software_foundation

CVSS Score

5.0

Found a potential security threat?