Описание
JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.
JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-3273
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457757
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44235
- https://jira.jboss.org/jira/browse/JBPAPP-544
- http://marc.info/?l=bugtraq&m=132698550418872&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0825.html
- http://rhn.redhat.com/errata/RHSA-2008-0826.html
- http://rhn.redhat.com/errata/RHSA-2008-0827.html
- http://rhn.redhat.com/errata/RHSA-2008-0828.html
- http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp03/html-single/readme/index.html
- http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp01/html-single/readme
- http://www.securityfocus.com/bid/30540
- http://www.securitytracker.com/id?1020628
EPSS
CVE ID
Связанные уязвимости
JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.
JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.
JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string.
JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2 ...
EPSS