Oracle 9i Application Server 1.0.2 allows remote attackers to obtain the physical path of a file under the server root via a request for a non-existent .JSP file, which leaks the pathname in an error message.
References
Link | Resource |
---|---|
http://www.cert.org/advisories/CA-2002-08.html | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/3341 | Exploit Patch Vendor Advisory |
http://www.nii.co.in/research.html | |
http://otn.oracle.com/deploy/security/pdf/jspexecute_alert.pdf | |
http://www.kb.cert.org/vuls/id/278971 | US Government Resource |
http://marc.info/?l=bugtraq&m=100074087824021&w=2 | |
http://marc.info/?l=bugtraq&m=100119633925473&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7135 |
Configurations
Information
Published : 2002-02-05 21:00
Updated : 2017-10-09 18:30
NVD link : CVE-2001-1372
Mitre link : CVE-2001-1372
JSON object : View
CWE
Products Affected
oracle
- application_server