Oracle iPlanet Web Server (formerly Sun Java System Web Server or Sun ONE Web Server) 6.1 before SP12, and 7.0 through Update 6, when running on Windows, allows remote attackers to read arbitrary JSP files via an alternate data stream syntax, as demonstrated by a .jsp::$DATA URI.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://isowarez.de/SunOne_Webserver.txt - Exploit | |
References | () http://jvn.jp/en/jp/JVN47124169/index.html - | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2009-002069 - | |
References | () http://secunia.com/advisories/35701 - Vendor Advisory | |
References | () http://securitytracker.com/id?1022511 - Exploit | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-266429-1 - Vendor Advisory | |
References | () http://www.osvdb.org/55655 - | |
References | () http://www.vupen.com/english/advisories/2009/1786 - Vendor Advisory |
Information
Published : 2009-07-13 17:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2445
Mitre link : CVE-2009-2445
CVE.ORG link : CVE-2009-2445
JSON object : View
Products Affected
sun
- java_system_web_server
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor