File: 2484.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (57 lines) | stat: -rw-r--r-- 1,070 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
Rule:
--
Sid:
2484

--
Summary:
This event is generated when a remote user attempts to access source.jsp
on a Tomcat web server. This may indicate an attempt to exploit a
directory traversal vulnerability.

--
Impact:
Information gathering.

--
Detailed Information:
This event may indicate an attempt to exploit a vulnerability in the
source.jsp script. An attacker can use directory traversal techniques
when accessing source.jsp to view hidden files and directories on the
web server with the access privileges of the server. 

--
Affected Systems:
	Apache Tomcat on Novell Netware 6.0

--
Attack Scenarios:
An attacker can use directory traversal techniques when executing
source.jsp to view directories and files on the web server.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--