5
CVSSv2

CVE-2002-2007

Published: 31/12/2002 Updated: 05/09/2008
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 515
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote malicious users to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 3.2.4

apache tomcat 3.2.3

Exploits

source: wwwsecurityfocuscom/bid/4877/info Apache Tomcat is a freely available, open source web server maintained by the Apache Foundation When Apache Tomcat is installed with a default configuration, several example files are also installed When some of these example files are requested without any input, they will return an error cont ...
source: wwwsecurityfocuscom/bid/4876/info Apache Tomcat is a freely available, open source web server maintained by the Apache Foundation Under some circumstances, Tomcat may yield sensitive information about the web server configuration When the sourcejsp page is passed a malformed request, it may leak information This information m ...
source: wwwsecurityfocuscom/bid/4878/info Apache Tomcat is a freely available, open source web server maintained by the Apache Foundation Under some circumstances, Tomcat may yield sensitive information about the web server configuration When the realPathjsp page is accessed, it may leak information Upon being accessed, the realPath ...