Allaire JRun 2.3.3, 3.0 and 3.1 running on IIS 4.0 and 5.0, iPlanet, Apache, JRun web server (JWS), and possibly other web servers allows remote attackers to read arbitrary files and directories by appending (1) "%3f.jsp", (2) "?.jsp" or (3) "?" to the requested URL.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/242843/2002-07-27/2002-08-02/2 - | |
References | () http://online.securityfocus.com/archive/1/243203 - | |
References | () http://www.iss.net/security_center/static/7623.php - Exploit | |
References | () http://www.macromedia.com/v1/handlers/index.cfm?ID=22262&Method=Full - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/243636 - | |
References | () http://www.securityfocus.com/bid/3592 - |
Information
Published : 2001-12-31 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1510
Mitre link : CVE-2001-1510
CVE.ORG link : CVE-2001-1510
JSON object : View
Products Affected
macromedia
- jrun
CWE