[原文]The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org.
Tomcat contains a flaw that may allow a remote attacker to read arbitrary files. The problem is that the default installation of the application does not restrict access to the /admin context. It is possible for a remote attacker to add a context for the root directory by directly calling the administrative servlets and view arbitrary files on the system, resulting in a loss of confidentiality.
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Restrict access to /admin or remove this context, and do not run Tomcat as root.