HTTP: Tomcat "Source.jsp" Malicious Request
This signature detects attempts to exploit a known vulnerability in Source.jsp, an example program that ships by default with Apache Tomcat, a free open source Java server. Apache Tomcat versions 3.23 and 3.24 are vulnerable. Upon receiving a maliciously crafted request, Source.jsp displays the DocumentRoot and directory listing (v3.24 yields directory listing only) for the Web server software. Attackers can use this information to perform targeted Web-based attacks, such as directory traversals.
Extended Description
Apache Tomcat is a freely available, open source web server maintained by the Apache Foundation. Under some circumstances, Tomcat may yield sensitive information about the web server configuration. When the source.jsp page is passed a malformed request, it may leak information. This information may include the web root directory, and possibly a directory listing.
Affected Products
Apache_software_foundation tomcat
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Apache_software_foundation