Description
Blazix before 1.2.2 allows remote attackers to read source code of JSP scripts or list restricted web directories via an HTTP request that ends in a (1) "+" or (2) "\" (backslash) character.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Auriemma Luigi · textremotemultiple
https://www.exploit-db.com/exploits/21752
exploitdb
WRITEUP
VERIFIED
by Auriemma Luigi · textremotemultiple
https://www.exploit-db.com/exploits/21751
References (4)
Core 4
Core References
Third Party Advisory vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/9952.php
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2002-08/0259.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/5567
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/5566
Scores
EPSS
0.0578
EPSS Percentile
90.5%
Details
Status
published
Products (2)
desiderata_software/blazix
1.2
desiderata_software/blazix
1.2.1
Published
Aug 24, 2002
Tracked Since
Feb 18, 2026