[原文]Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
[CNNVD]Apache Software Foundation Tomcat Servlet读取任意'jsp'文件的源代码漏洞(CNNVD-200108-021)
Apache Software Foundation Tomcat Servlet 3.2.2之前的版本存在漏洞。远程攻击者借助畸形的URL请求读取任意'jsp'文件的源代码，该URL请求不以HTTP协议规范(i.e. HTTP/1.0)结束。
Apache Tomcat in a Windows NT environment could be led to traverse the normal directory structure and return requested files from outside of the document root.
By including '/../' sequences along with specially chosen characters in requested URLs, a remote user can obtain read access to directories and files outside of the document root, potentially compromising the privacy of user data and/or obtaining information which could be used to further compromise the host.
The following examples have been provided by lovehacker <email@example.com>:
Will cause the Tomcat server to send back the content of win.ini.
will disclose a directory listing from outside Tomcat's normal directory tree.
will reveal the requested file [filename].
Jakarta Tomcat contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker send a GET request that does not end with an HTTP protocol specification (HTTP/1.0 or HTTP/1.1)which will disclose source code of the requested JSP file resulting in a loss of confidentiality.
Upgrade to version 3.2.2b1 and 3.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.