Vulnerability Description
The default configuration of the jserv-status handler in jserv.conf in Apache JServ 1.1.2 includes an "allow from 127.0.0.1" line, which allows local users to discover JDBC passwords or other sensitive information via a direct request to the jserv/ URI.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Jserv | 1.1.2 |
Related Weaknesses (CWE)
References
- http://archive.apache.org/dist/java/java.apache.org-www.tar.gzPatch
- http://marc.info/?l=java-apache-users&m=97036799917909&w=2Exploit
- http://securityreason.com/securityalert/8412
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51946
- http://archive.apache.org/dist/java/java.apache.org-www.tar.gzPatch
- http://marc.info/?l=java-apache-users&m=97036799917909&w=2Exploit
- http://securityreason.com/securityalert/8412
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51946
FAQ
What is CVE-2000-1247?
CVE-2000-1247 is a vulnerability with a CVSS score of 2.1 (LOW). The default configuration of the jserv-status handler in jserv.conf in Apache JServ 1.1.2 includes an "allow from 127.0.0.1" line, which allows local users to discover JDBC passwords or other sensitiv...
How severe is CVE-2000-1247?
CVE-2000-1247 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-1247?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Jserv.