CVE-2002-0300

gnujsp 1.0.0-1.0.1 - Info Disclosure

Title source: llm
STIX 2.1

Description

gnujsp 1.0.0 and 1.0.1 allows remote attackers to list directories, read source code of certain scripts, and bypass access restrictions by directly requesting the target file from the gnujsp servlet, which does not work around a limitation of JServ and does not process the requested file.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Thomas Springer · textremotemultiple
https://www.exploit-db.com/exploits/21295

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/4125
Third Party Advisory vdb-entry x_refsource_xf
http://www.iss.net/security_center/static/8240.php
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=101422432123898&w=2
Patch, Vendor Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2002/dsa-114
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=101415804625292&w=2

Scores

EPSS 0.0511
EPSS Percentile 89.9%

Details

Status published
Products (2)
gnujsp/gnujsp 1.0.0
gnujsp/gnujsp 1.0.1
Published May 31, 2002
Tracked Since Feb 18, 2026