IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/1500 | patch vendor advisory vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5012 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2000-07/0342.html | patch vendor advisory mailing list exploit |