Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. NOTE: this issue exists because of a CVE-2008-3273 regression.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://rhn.redhat.com/errata/RHSA-2010-0379.html | vendor advisory |
https://rhn.redhat.com/errata/RHSA-2010-0378.html | vendor advisory |
http://marc.info/?l=bugtraq&m=132698550418872&w=2 | vendor advisory |
https://rhn.redhat.com/errata/RHSA-2010-0376.html | vendor advisory |
https://rhn.redhat.com/errata/RHSA-2010-0377.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/58149 | vdb entry |
http://www.vupen.com/english/advisories/2010/0992 | vdb entry vendor advisory |
https://www.exploit-db.com/exploits/44009/ | exploit |
http://www.securityfocus.com/bid/39710 | vdb entry |
http://secunia.com/advisories/39563 | third party advisory vendor advisory |
http://securitytracker.com/id?1023918 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=585900 |