Short Name |
HTTP:TOMCAT:SOURCE-MAL-REQ |
---|---|
Severity |
Info |
Recommended |
No |
Category |
HTTP |
Keywords |
Apache Tomcat |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in Source.jsp, an example program that ships by default with Apache Tomcat, a free open source Java server. Apache Tomcat versions 3.23 and 3.24 are vulnerable. Upon receiving a maliciously crafted request, Source.jsp displays the DocumentRoot and directory listing (v3.24 yields directory listing only) for the Web server software. Attackers can use this information to perform targeted Web-based attacks, such as directory traversals.
Apache Tomcat is a freely available, open source web server maintained by the Apache Foundation. Under some circumstances, Tomcat may yield sensitive information about the web server configuration. When the source.jsp page is passed a malformed request, it may leak information. This information may include the web root directory, and possibly a directory listing.