• <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>
    • 軟件測試技術
    • 軟件測試博客
    • 軟件測試視頻
    • 開源軟件測試技術
    • 軟件測試論壇
    • 軟件測試沙龍
    • 軟件測試資料下載
    • 軟件測試雜志
    • 軟件測試人才招聘
      暫時沒有公告

    字號: | 推薦給好友 上一篇 | 下一篇

    apache tomcat的snoop servlet漏洞 

    發布: 2007-7-01 18:47 | 作者: admin | 來源: | 查看: 13次 | 進入軟件測試論壇討論

    領測軟件測試網 bugtraq id 1500
    class Access Validation Error
    cve GENERIC-MAP-NOMATCH
    remote Yes
    local Yes
    published July 24, 2000
    updated July 24, 2000
    vulnerable IBM Websphere Application Server 3.0.21
    - Sun Solaris 8.0
    - Microsoft Windows NT 4.0
    - Linux kernel 2.3.x
    - IBM AIX 4.3
    IBM Websphere Application Server 3.0
    - Sun Solaris 8.0
    - Novell Netware 5.0
    - Microsoft Windows NT 4.0
    - Linux kernel 2.3.x
    - IBM AIX 4.3
    IBM Websphere Application Server 2.0
    - Sun Solaris 8.0
    - Novell Netware 5.0
    - Microsoft Windows NT 4.0
    - Linux kernel 2.3.x
    - IBM AIX 4.3

    Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.

    This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user.

    The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability - full text of this advisory is available in the @#Credit@# section of this entry:

    "It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without being
    parsed or compiled. For example if the URL for a file "login.jsp" is:

    http://site.running.websphere/login.jsp

    then accessing

    http://site.running.websphere/servlet/file/login.jsp

    would cause the unparsed contents of the file to show up in the web browser."

    文章來源于領測軟件測試網 http://www.kjueaiud.com/


    關于領測軟件測試網 | 領測軟件測試網合作伙伴 | 廣告服務 | 投稿指南 | 聯系我們 | 網站地圖 | 友情鏈接
    版權所有(C) 2003-2010 TestAge(領測軟件測試網)|領測國際科技(北京)有限公司|軟件測試工程師培訓網 All Rights Reserved
    北京市海淀區中關村南大街9號北京理工科技大廈1402室 京ICP備10010545號-5
    技術支持和業務聯系:info@testage.com.cn 電話:010-51297073

    軟件測試 | 領測國際ISTQBISTQB官網TMMiTMMi認證國際軟件測試工程師認證領測軟件測試網

    老湿亚洲永久精品ww47香蕉图片_日韩欧美中文字幕北美法律_国产AV永久无码天堂影院_久久婷婷综合色丁香五月

  • <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>