Whale communications e-Gap security appliance is a tool to provide a secure remote web access platform. A vulnerability exists that may permit a remote attacker to gain access to the source code of the login page.
Whale communications e-Gap security appliance version 2.5 running on a Microsoft Windows 2000 platform contains a vulnerability that may leak the pre-processed source code of the login page. By submitting an HTTP TRACE method request with a target URL, the appliance will return the source code of the target page. It is reported that this issue has been tested against the login page.
See the ProCheckUp Security Bulletin for further details.
A remote attacker can obtain the source code of the login page. This may lead to information disclosure about the system.
Whale Communications has produced a patch for this vulnerability and has advised customers to contact their local Whale Communications support contact to obtain the fix. Customers may also contact Whale Communications Support at email@example.com.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Updated: January 14, 2004
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
Thanks to ProCheckUp for reporting this vulnerability.
This document was written by Jason A Rafail and is based on the information provided by ProCheckUp.
CVE IDs: | None
Severity Metric: | 1.88
Date Public: | 2003-12-22
Date First Published: | 2004-01-14
Date Last Updated: | 2004-01-21 15:23 UTC
Document Revision: | 9