Oracle iPlanet Web Server (formerly Sun Java System Web Server or Sun ONE Web Server) 6.1 before SP12, and 7.0 through Update 6, when running on Windows, allows remote attackers to read arbitrary JSP files via an alternate data stream syntax, as demonstrated by a .jsp::$DATA URI.
References
Link | Resource |
---|---|
http://www.osvdb.org/55655 | |
http://isowarez.de/SunOne_Webserver.txt | Exploit |
http://securitytracker.com/id?1022511 | Exploit |
http://secunia.com/advisories/35701 | Vendor Advisory |
http://www.vupen.com/english/advisories/2009/1786 | Vendor Advisory |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-266429-1 | Vendor Advisory |
http://jvn.jp/en/jp/JVN47124169/index.html | |
http://jvndb.jvn.jp/jvndb/JVNDB-2009-002069 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-07-13 10:30
Updated : 2011-08-28 21:00
NVD link : CVE-2009-2445
Mitre link : CVE-2009-2445
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
sun
- java_system_web_server