JRun 3.0 and 3.1 running on JRun Web Server (JWS) and IIS allows remote attackers to read arbitrary JavaServer Pages (JSP) source code via a request URL containing the source filename ending in (1) "jsp%00" or (2) "js%2570".
References
Link | Resource |
---|---|
http://www.iss.net/security_center/static/7676.php | Exploit Patch |
http://www.macromedia.com/v1/handlers/index.cfm?ID=22288&Method=Full | Exploit Patch Vendor Advisory |
http://www.iss.net/security_center/static/7676.php | Exploit Patch |
http://www.macromedia.com/v1/handlers/index.cfm?ID=22288&Method=Full | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.iss.net/security_center/static/7676.php - Exploit, Patch | |
References | () http://www.macromedia.com/v1/handlers/index.cfm?ID=22288&Method=Full - Exploit, Patch, Vendor Advisory |
Information
Published : 2001-12-31 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1511
Mitre link : CVE-2001-1511
CVE.ORG link : CVE-2001-1511
JSON object : View
Products Affected
macromedia
- jrun
CWE