The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/1459 | |
http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html | Patch Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/1459 | |
http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2000-07/0163.html - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/1459 - | |
References | () http://www.sun.com/software/jwebserver/faq/jwsca-2000-02.html - Patch, Vendor Advisory |
Information
Published : 2000-07-12 04:00
Updated : 2024-11-20 23:32
NVD link : CVE-2000-0629
Mitre link : CVE-2000-0629
CVE.ORG link : CVE-2000-0629
JSON object : View
Products Affected
sun
- java_system_web_server
CWE