Vulnerability Description
The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat | 3.2.3 |
References
- http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.htmlExploit
- http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.htmlExploit
- http://www.iss.net/security_center/static/9208.php
- http://www.kb.cert.org/vuls/id/116963US Government Resource
- http://www.procheckup.com/security_info/vuln_pr0205.html
- http://www.procheckup.com/security_info/vuln_pr0206.html
- http://www.procheckup.com/security_info/vuln_pr0207.html
- http://www.securityfocus.com/bid/4876Exploit
- http://www.securityfocus.com/bid/4877Exploit
- http://www.securityfocus.com/bid/4878Exploit
- http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.htmlExploit
- http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.htmlExploit
- http://www.iss.net/security_center/static/9208.php
- http://www.kb.cert.org/vuls/id/116963US Government Resource
- http://www.procheckup.com/security_info/vuln_pr0205.html
FAQ
What is CVE-2002-2007?
CVE-2002-2007 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for ...
How severe is CVE-2002-2007?
CVE-2002-2007 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-2007?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat.