ID CVE-2000-1114 Type cve Reporter NVD Modified 2008-09-05T16:22:41
Description
Unify ServletExec AS v3.0C allows remote attackers to read source code for JSP pages via an HTTP request that ends with characters such as ".", or "+", or "%20".
{"href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1114", "history": [], "references": ["http://www.securityfocus.com/bid/1970", "http://archives.neohapsis.com/archives/bugtraq/2000-11/0285.html"], "lastseen": "2016-09-03T02:49:42", "bulletinFamily": "NVD", "title": "CVE-2000-1114", "cpe": ["cpe:/a:unify:ewave_servletexec:3.0", "cpe:/a:unify:ewave_servletexec:3.0c"], "viewCount": 2, "id": "CVE-2000-1114", "hash": "24580a18c8ccdd309c44687451ac06128364dadbeeefac7add82923b5e3a9a17", "description": "Unify ServletExec AS v3.0C allows remote attackers to read source code for JSP pages via an HTTP request that ends with characters such as \".\", or \"+\", or \"%20\".", "edition": 1, "assessment": {"name": "", "href": "", "system": ""}, "cvelist": ["CVE-2000-1114"], "scanner": [], "modified": "2008-09-05T16:22:41", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "objectVersion": "1.2", "reporter": "NVD", "type": "cve", "published": "2001-01-09T00:00:00", "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2016-09-03T02:49:42"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:6658"]}, {"type": "exploitdb", "idList": ["EDB-ID:20412"]}], "modified": "2016-09-03T02:49:42"}, "vulnersScore": 5.0}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:01", "bulletinFamily": "software", "description": "# No description provided by the source\n\n## References:\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2000-11/0285.html\n[CVE-2000-1114](https://vulners.com/cve/CVE-2000-1114)\nBugtraq ID: 1970\n", "modified": "2000-11-21T00:00:00", "published": "2000-11-21T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:6658", "id": "OSVDB:6658", "type": "osvdb", "title": "Unify ServletExec JSP Source Disclosure", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-02T14:12:19", "bulletinFamily": "exploit", "description": "Unify eWave ServletExec 3 JSP Source Disclosure Vulnerability. CVE-2000-1114. Remote exploit for jsp platform", "modified": "2000-11-21T00:00:00", "published": "2000-11-21T00:00:00", "id": "EDB-ID:20412", "href": "https://www.exploit-db.com/exploits/20412/", "type": "exploitdb", "title": "Unify eWave ServletExec 3 JSP Source Disclosure Vulnerability", "sourceData": "source : http://www.securityfocus.com/bid/1970/info\r\n\r\nUnify eWave ServletExec is a Java/Java Servlet engine plug-in for major web servers such as Microsoft IIS, Apache, Netscape Enterprise Server, etc. \r\n\r\nServletExec will return the source code of JSP files when a HTTP request is appended with one of the following characters:\r\n\r\n.\r\n%2E\r\n+\r\n%2B\r\n%5C\r\n%20\r\n%00\r\n\r\nFor example, the following URL will yield the source of the specified JSP file:\r\n\r\nhttp://target/directory/jsp/file.jsp.\r\n\r\nSuccessful exploitation could lead to the disclosure of sensitive information contained within JSP pages.\r\n\r\nAny of the following URL requests will yield the source of the specified JSP file:\r\n\r\nhttp://target/directory/jsp/file.jsp. \r\nhttp://target/directory/jsp/file.jsp%2E\r\nhttp://target/directory/jsp/file.jsp+ \r\nhttp://target/directory/jsp/file.jsp%2B\r\nhttp://target/directory/jsp/file.jsp\\ \r\nhttp://target/directory/jsp/file.jsp%5C\r\nhttp://target/directory/jsp/file.jsp%20 \r\nhttp://target/directory/jsp/file.jsp%00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/20412/"}]}