一看桃花自悠然,几重烟雨渡青山,看不够,晓雾散,轻红醉洛川。二月桃花临水看,溪水青丝绕指转,转不完,浮生梦,共悲欢。三生桃花绘成扇,细雨落花人独看,唱不尽,相思阙,落鸿为谁传。四叹桃花入梦寒,几夜青灯为君燃。
bugtraq id 1500 class Access Validation Error cve GENERIC-MAP-NOMATCH remote Yes local Yes published July 24, 2000 updated July 24, 2000 vulnerable IBM Websphere Application Server 3.0.21- Sun Solaris 8.0- Microsoft Windows NT 4.0- Linux kernel 2.3.x- IBM AIX 4.3IBM Websphere Application Server 3.0- Sun Solaris 8.0- Novell Netware 5.0- Microsoft Windows NT 4.0- Linux kernel 2.3.x- IBM AIX 4.3IBM Websphere Application Server 2.0- Sun Solaris 8.0- Novell Netware 5.0- Microsoft Windows NT 4.0- Linux kernel 2.3.x- IBM AIX 4.3 Certain versions of the IBM WebSphere application server ship with a vulnerability which allows malicious users to view the source of any document which resides in the web document root directory.This is possible via a flaw which allows a default servlet (different servlets are used to parse different types of content, JHTML, HTMl, JSP, etc.) This default servlet will display the document/page without parsing/compiling it hence allowing the code to be viewed by the end user. The Foundstone, Inc. advisory which covered this problem detailed the following method of verifying the vulnerability - full text of this advisory is available in the 'Credit' section of this entry:"It is easy to verify this vulnerability for a given system. Prefixing the path to web pages with "/servlet/file/" in the URL causes the file to be displayed without beingparsed or compiled. For example if the URL for a file "login.jsp" is:http://site.running.websphere/login.jspthen accessinghttp://site.running.websphere/servlet/file/login.jspwould cause the unparsed contents of the file to show up in the web browser." 以上就是IBM WebSphere源代码暴露漏洞。要给用户意想不到的惊喜。更多关于IBM WebSphere源代码暴露漏洞请关注haodaima.com其它相关文章!