Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Java System Application Server Remote Installation Path Disclosure Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
Java System Application Server
by:
7.5
CVSS
HIGH
Remote Installation Path Disclosure
200
CWE
Product Name: Java System Application Server
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Java System Application Server Remote Installation Path Disclosure Vulnerability

The Java System Application Server is prone to a remote installation path disclosure vulnerability. This vulnerability occurs due to a failure of the application to properly filter user requests. Successful exploitation of this vulnerability may allow an attacker to gain sensitive information about the file system, which can be used to launch more direct attacks against the system.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper input validation and filtering mechanisms in the application to prevent unauthorized access to sensitive information. Regular security audits and updates should also be performed to address any potential vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10424/info

It is reported that Java System Application Server is prone to a remote installation path disclosure vulnerability. This issue is due to a failure of the application to properly filter user requests.

Successful exploitation of this issue may allow an attacker to gain sensitive information about the file system that may aid in launching more direct attacks against the system. 

http://www.example.com:8080////
http://www.example.com:8080////CON