Описание
JBOSS 3.2.2 through 3.2.7 and 4.0.2 allows remote attackers to obtain sensitive information via a GET request (1) with a "%." (percent dot), which reveals the installation path or (2) with a % (percent) before a filename, which reveals the contents of the file.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:jboss:jboss:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:jboss:jboss:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:jboss:jboss:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:jboss:jboss:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:jboss:jboss:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:jboss:jboss:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:jboss:jboss:4.0.2:*:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.1459
Средний
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
JBOSS 3.2.2 through 3.2.7 and 4.0.2 allows remote attackers to obtain sensitive information via a GET request (1) with a "%." (percent dot), which reveals the installation path or (2) with a % (percent) before a filename, which reveals the contents of the file.
EPSS
Процентиль: 94%
0.1459
Средний
5 Medium
CVSS2
Дефекты
NVD-CWE-Other