Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message.
tomcat.apache.org/security-4.html
www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-04/0286.html
www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-04/0297.html
www.securityfocus.com/bid/4557
exchange.xforce.ibmcloud.com/vulnerabilities/42915
lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E