Описание
The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet.
Ссылки
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:sun:java_system_web_server:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_web_server:2.0:*:*:*:*:*:*:*
EPSS
Процентиль: 81%
0.01516
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet.
EPSS
Процентиль: 81%
0.01516
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other