Vulnerability Description
The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat | 3.0 |
References
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.htmlBroken LinkExploitPatch
- http://www.securityfocus.com/bid/1548Third Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5160Third Party AdvisoryVDB Entry
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0309.htmlBroken LinkExploitPatch
- http://www.securityfocus.com/bid/1548Third Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5160Third Party AdvisoryVDB Entry
FAQ
What is CVE-2000-0672?
CVE-2000-0672 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add...
How severe is CVE-2000-0672?
CVE-2000-0672 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0672?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat.