Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-4609

Опубликовано: 25 окт. 2009
Источник: redhat

Описание

The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.

Дополнительная информация

Статус:

Low
Дефект:
CWE-79
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=532693jetty: multiple XSS and information leaks in demo servlets

Связанные уязвимости

ubuntu
почти 16 лет назад

The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.

nvd
почти 16 лет назад

The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.

debian
почти 16 лет назад

The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attacke ...

github
больше 3 лет назад

The Dump Servlet in Mort Bay Jetty 6.x and 7.0.0 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.