Orion Application Server 1.5.3, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/279582 | Not Applicable |
http://www.iss.net/security_center/static/9446.php | Patch |
http://www.securityfocus.com/bid/5119 | Third Party Advisory VDB Entry |
http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt | Vendor Advisory |
http://online.securityfocus.com/archive/1/279582 | Not Applicable |
http://www.iss.net/security_center/static/9446.php | Patch |
http://www.securityfocus.com/bid/5119 | Third Party Advisory VDB Entry |
http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt | Vendor Advisory |
Configurations
History
20 Nov 2024, 23:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://online.securityfocus.com/archive/1/279582 - Not Applicable | |
References | () http://www.iss.net/security_center/static/9446.php - Patch | |
References | () http://www.securityfocus.com/bid/5119 - Third Party Advisory, VDB Entry | |
References | () http://www.westpoint.ltd.uk/advisories/wp-02-0002.txt - Vendor Advisory |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:42
NVD link : CVE-2002-1859
Mitre link : CVE-2002-1859
CVE.ORG link : CVE-2002-1859
JSON object : View
Products Affected
orionserver
- orion_application_server
CWE