Description
gnujsp 1.0.0 and 1.0.1 allows remote attackers to list directories, read source code of certain scripts, and bypass access restrictions by directly requesting the target file from the gnujsp servlet, which does not work around a limitation of JServ and does not process the requested file.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Thomas Springer · textremotemultiple
https://www.exploit-db.com/exploits/21295
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/4125
Third Party Advisory vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/8240.php
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=101422432123898&w=2
Patch, Vendor Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2002/dsa-114
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=101415804625292&w=2
Scores
EPSS
0.0511
EPSS Percentile
89.9%
Details
Status
published
Products (2)
gnujsp/gnujsp
1.0.0
gnujsp/gnujsp
1.0.1
Published
May 31, 2002
Tracked Since
Feb 18, 2026