Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:TOMCAT:SOURCE-MAL-REQ

Severity

Info

Recommended

No

Category

HTTP

Keywords

Apache Tomcat

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Tomcat "Source.jsp" Malicious Request


This signature detects attempts to exploit a known vulnerability in Source.jsp, an example program that ships by default with Apache Tomcat, a free open source Java server. Apache Tomcat versions 3.23 and 3.24 are vulnerable. Upon receiving a maliciously crafted request, Source.jsp displays the DocumentRoot and directory listing (v3.24 yields directory listing only) for the Web server software. Attackers can use this information to perform targeted Web-based attacks, such as directory traversals.

Extended Description

Apache Tomcat is a freely available, open source web server maintained by the Apache Foundation. Under some circumstances, Tomcat may yield sensitive information about the web server configuration. When the source.jsp page is passed a malformed request, it may leak information. This information may include the web root directory, and possibly a directory listing.

Affected Products

  • Apache Software Foundation Tomcat 3.2.3
  • Apache Software Foundation Tomcat 3.2.4

References

  • BugTraq: 4876
  • URL: http://online.securityfocus.com/archive/1/274623

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out