CVE-2002-1148
CVSS5.0
发布时间 :2002-10-11 00:00:00
修订时间 :2016-10-17 22:24:05
NMCOES    

[原文]The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.


[CNNVD]Apache Tomcat DefaultServlet文件泄露漏洞(CNNVD-200210-257)

        Tomcat 4.0.4版本和4.1.10版本以及之前版本中的默认控制器(org.apache.catalina.servlets.DefaultServlet)存在漏洞,远程攻击者可以借助到控制器的直接请求读取服务器文件的源代码。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:apache:tomcat:3.2.1Apache Software Foundation Tomcat 3.2.1
cpe:/a:apache:tomcat:3.2.2:beta2Apache Software Foundation Tomcat 3.2.2 Beta2
cpe:/a:apache:tomcat:3.3Apache Software Foundation Tomcat 3.3
cpe:/a:apache:tomcat:3.3.1Apache Software Foundation Tomcat 3.3.1
cpe:/a:apache:tomcat:4.1.9:betaApache Software Foundation Tomcat 4.1.9 beta
cpe:/a:apache:tomcat:4.0.2Apache Software Foundation Tomcat 4.0.2
cpe:/a:apache:tomcat:4.1.3:betaApache Software Foundation Tomcat 4.1.3 beta
cpe:/a:apache:tomcat:4.0.3Apache Software Foundation Tomcat 4.0.3
cpe:/a:apache:tomcat:4.0.4Apache Software Foundation Tomcat 4.0.4
cpe:/a:apache:tomcat:4.1.10Apache Software Foundation Tomcat 4.1.10
cpe:/a:apache:tomcat:4.0.0Apache Software Foundation Tomcat 4.0.0
cpe:/a:apache:tomcat:4.0.1Apache Software Foundation Tomcat 4.0.1
cpe:/a:apache:tomcat:4.1.0Apache Software Foundation Tomcat 4.1.0
cpe:/a:apache:tomcat:3.2Apache Software Foundation Tomcat 3.2
cpe:/a:apache:tomcat:3.2.3Apache Software Foundation Tomcat 3.2.3
cpe:/a:apache:tomcat:3.1Apache Software Foundation Tomcat 3.1
cpe:/a:apache:tomcat:3.2.4Apache Software Foundation Tomcat 3.2.4
cpe:/a:apache:tomcat:3.0Apache Software Foundation Tomcat 3.0
cpe:/a:apache:tomcat:3.1.1Apache Software Foundation Tomcat 3.1.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1148
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1148
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-257
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=103288242014253&w=2
(UNKNOWN)  BUGTRAQ  20020924 JSP source code exposure in Tomcat 4.x
http://online.securityfocus.com/advisories/4758
(UNKNOWN)  HP  HPSBUX0212-229
http://www.debian.org/security/2002/dsa-170
(UNKNOWN)  DEBIAN  DSA-170
http://www.iss.net/security_center/static/10175.php
(VENDOR_ADVISORY)  XF  tomcat-servlet-source-code(10175)
http://www.redhat.com/support/errata/RHSA-2002-217.html
(UNKNOWN)  REDHAT  RHSA-2002:217
http://www.redhat.com/support/errata/RHSA-2002-218.html
(UNKNOWN)  REDHAT  RHSA-2002:218
http://www.securityfocus.com/bid/5786
(VENDOR_ADVISORY)  BID  5786

- 漏洞信息

Apache Tomcat DefaultServlet文件泄露漏洞
中危 未知
2002-10-11 00:00:00 2005-05-13 00:00:00
远程  
        Tomcat 4.0.4版本和4.1.10版本以及之前版本中的默认控制器(org.apache.catalina.servlets.DefaultServlet)存在漏洞,远程攻击者可以借助到控制器的直接请求读取服务器文件的源代码。

- 公告与补丁

        Fixed versions of Tomcat are available. Please see the references for details.
        Sun Solaris 9
        
        Sun Solaris 9_x86
        
        Apache Software Foundation Tomcat 3.0
        
        Apache Software Foundation Tomcat 3.1
        
        Apache Software Foundation Tomcat 3.1.1
        
        Apache Software Foundation Tomcat 3.2
        
        Apache Software Foundation Tomcat 3.2.1
        
        Apache Software Foundation Tomcat 3.2.2 beta2
        
        Apache Software Foundation Tomcat 3.2.3
        
        Apache Software Foundation Tomcat 3.2.4
        
        Apache Software Foundation Tomcat 3.3
        
        Apache Software Foundation Tomcat 3.3.1
        
        Apache Software Foundation Tomcat 4.0
        
        Apache Software Foundation Tomcat 4.0.1
        
        Apache Software Foundation Tomcat 4.0.2
        
        Apache Software Foundation Tomcat 4.0.3
        
        Apache Software Foundation Tomcat 4.0.4
        
        Apache Software Foundation Tomcat 4.1
        
        Apache Software Foundation Tomcat 4.1.10
        
        Apache Software Foundation Tomcat 4.1.3 beta
        
        Apache Software Foundation Tomcat 4.1.9 beta
        

- 漏洞信息 (21853)

Apache Tomcat 3/4 DefaultServlet File Disclosure Vulnerability (EDBID:21853)
unix remote
2002-09-24 Verified
0 Rossen Raykov
N/A [点击下载]
source: http://www.securityfocus.com/bid/5786/info

The servlet 'org.apache.catalina.servlets.DefaultServlet' is included with Apache Tomcat by default. It is possible to use this servlet to view contents of files within the webroot. This includes JSP source code, which may contain sensitive data such as database usernames and passwords.

http://target/admin/servlet/org.apache.catalina.servlets.DefaultServlet/target.jsp		

- 漏洞信息

8773
Apache Tomcat Catalina org.apache.catalina.servlets.DefaultServlet Source Code Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality

- 漏洞描述

Apache Tomcat contains a flaw that may allow a remote attacker to gain access to file source code. The issue is due to the default servlet (org.apache.catalina.servlets.DefaultServlet) allowing requests directly to it, which will allow an attacker to view the source code for server files.

- 时间线

2002-09-24 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apache Tomcat DefaultServlet File Disclosure Vulnerability
Unknown 5786
Yes No
2002-09-24 12:00:00 2008-09-05 06:41:00
Discovered by Rossen Raykov <Rossen.Raykov@CognicaseUSA.com>.

- 受影响的程序版本

Sun Solaris 9_x86
Sun Solaris 9_sparc
Sun Solaris 9
Sun Solaris 10_x86
Sun Solaris 10_sparc
Sun Solaris 10
HP VirtualVault 11.0.4
Apache Software Foundation Tomcat 4.1.10
Apache Software Foundation Tomcat 4.1.9 beta
Apache Software Foundation Tomcat 4.1.3 beta
Apache Software Foundation Tomcat 4.1
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.3
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.5
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- SGI IRIX 3.3
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 4.0.4
Apache Software Foundation Tomcat 4.0.3
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
Apache Software Foundation Tomcat 4.0.2
Apache Software Foundation Tomcat 4.0.1
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- SGI IRIX 3.3
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 4.0
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 3.3.1
Apache Software Foundation Tomcat 3.3
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 3.2.4
Apache Software Foundation Tomcat 3.2.3
Apache Software Foundation Tomcat 3.2.2 beta2
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 3.2.1
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- HP Secure OS software for Linux 1.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 3.2
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 3.1.1
Apache Software Foundation Tomcat 3.1
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Conectiva Linux 5.1
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4.1 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 3.0
- BSDI BSD/OS 4.0
- Caldera OpenLinux 2.4
- Debian Linux 2.2
- Debian Linux 2.1
- Digital UNIX 4.0
- FreeBSD FreeBSD 5.0
- FreeBSD FreeBSD 4.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- NetBSD NetBSD 1.4.2 x86
- NetBSD NetBSD 1.4 x86
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 8_sparc
- Sun Solaris 7.0
Apache Software Foundation Tomcat 4.1.12
Apache Software Foundation Tomcat 4.0.5
+ RedHat Stronghold 4.0

- 不受影响的程序版本

Apache Software Foundation Tomcat 4.1.12
Apache Software Foundation Tomcat 4.0.5
+ RedHat Stronghold 4.0

- 漏洞讨论

The servlet 'org.apache.catalina.servlets.DefaultServlet' is included with Apache Tomcat by default. It is possible to use this servlet to view contents of files within the webroot. This includes JSP source code, which may contain sensitive data such as database usernames and passwords.

- 漏洞利用

Issue a request for the following URL, where 'target' is the target Tomcat server/port and 'target.jsp' is the desired JSP file:

http://target/admin/servlet/org.apache.catalina.servlets.DefaultServlet/target.jsp

- 解决方案

Fixed versions of Tomcat are available. Please see the references for details.


Sun Solaris 9

Sun Solaris 9_x86

Apache Software Foundation Tomcat 3.0

Apache Software Foundation Tomcat 3.1

Apache Software Foundation Tomcat 3.1.1

Apache Software Foundation Tomcat 3.2

Apache Software Foundation Tomcat 3.2.1

Apache Software Foundation Tomcat 3.2.2 beta2

Apache Software Foundation Tomcat 3.2.3

Apache Software Foundation Tomcat 3.2.4

Apache Software Foundation Tomcat 3.3

Apache Software Foundation Tomcat 3.3.1

Apache Software Foundation Tomcat 4.0

Apache Software Foundation Tomcat 4.0.1

Apache Software Foundation Tomcat 4.0.2

Apache Software Foundation Tomcat 4.0.3

Apache Software Foundation Tomcat 4.0.4

Apache Software Foundation Tomcat 4.1

Apache Software Foundation Tomcat 4.1.10

Apache Software Foundation Tomcat 4.1.3 beta

Apache Software Foundation Tomcat 4.1.9 beta

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站