Описание
IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string.
Ссылки
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ibm:websphere_application_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_application_server:3.0.21:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.04191
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string.
EPSS
Процентиль: 88%
0.04191
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other