Oracle 9i Application Server 1.0.2 allows remote attackers to obtain the physical path of a file under the server root via a request for a non-existent .JSP file, which leaks the pathname in an error message.
Link | Tags |
---|---|
http://www.cert.org/advisories/CA-2002-08.html | third party advisory us government resource |
http://www.securityfocus.com/bid/3341 | patch vendor advisory vdb entry exploit |
http://marc.info/?l=bugtraq&m=100119633925473&w=2 | mailing list |
http://www.kb.cert.org/vuls/id/278971 | third party advisory us government resource |
http://marc.info/?l=bugtraq&m=100074087824021&w=2 | mailing list |
http://otn.oracle.com/deploy/security/pdf/jspexecute_alert.pdf | |
http://www.nii.co.in/research.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7135 | vdb entry |