The default servlet (org.apache.catalina.servlets.DefaultServlet
) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
marc.info/?l=bugtraq&m=103288242014253&w=2
lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@<dev.tomcat.apache.org>
lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@<dev.tomcat.apache.org>
lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@<dev.tomcat.apache.org>
nvd.nist.gov/vuln/detail/CVE-2002-1148
web.archive.org/web/20021027204137/www.iss.net/security_center/static/10175.php
web.archive.org/web/20030113141130/online.securityfocus.com/advisories/4758
web.archive.org/web/20030710185447/www.securityfocus.com/bid/5786
web.archive.org/web/20040814165854/rhn.redhat.com/errata/RHSA-2002-217.html
web.archive.org/web/20040817035804/rhn.redhat.com/errata/RHSA-2002-218.html
web.archive.org/web/20070430075037/www.debian.org/security/2002/dsa-170