CVE-2002-2007 (GCVE-0-2002-2007)
Vulnerability from cvelistv5
Published
2005-07-14 04:00
Modified
2024-09-17 00:21
Severity ?
CWE
  • n/a
Summary
The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.
References
cve@mitre.org http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html Exploit
cve@mitre.org http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html Exploit
cve@mitre.org http://www.iss.net/security_center/static/9208.php
cve@mitre.org http://www.kb.cert.org/vuls/id/116963 US Government Resource
cve@mitre.org http://www.procheckup.com/security_info/vuln_pr0205.html
cve@mitre.org http://www.procheckup.com/security_info/vuln_pr0206.html
cve@mitre.org http://www.procheckup.com/security_info/vuln_pr0207.html
cve@mitre.org http://www.securityfocus.com/bid/4876 Exploit
cve@mitre.org http://www.securityfocus.com/bid/4877 Exploit
cve@mitre.org http://www.securityfocus.com/bid/4878 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html Exploit
af854a3a-2127-422b-91ae-364da2661108 http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.iss.net/security_center/static/9208.php
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/116963 US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.procheckup.com/security_info/vuln_pr0205.html
af854a3a-2127-422b-91ae-364da2661108 http://www.procheckup.com/security_info/vuln_pr0206.html
af854a3a-2127-422b-91ae-364da2661108 http://www.procheckup.com/security_info/vuln_pr0207.html
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/4876 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/4877 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/4878 Exploit
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:51:16.511Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#116963",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/116963"
          },
          {
            "name": "4876",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4876"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.procheckup.com/security_info/vuln_pr0206.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.procheckup.com/security_info/vuln_pr0205.html"
          },
          {
            "name": "tomcat-sample-reveal-path(9208)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9208.php"
          },
          {
            "name": "20020529 Vulnerability in Apache Tomcat v3.23 \u0026 v3.24 (part 2)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html"
          },
          {
            "name": "20020529 Vulnerability in Apache Tomcat v3.23 \u0026 v3.24",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.procheckup.com/security_info/vuln_pr0207.html"
          },
          {
            "name": "4877",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4877"
          },
          {
            "name": "4878",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4878"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-07-14T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#116963",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/116963"
        },
        {
          "name": "4876",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4876"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.procheckup.com/security_info/vuln_pr0206.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.procheckup.com/security_info/vuln_pr0205.html"
        },
        {
          "name": "tomcat-sample-reveal-path(9208)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9208.php"
        },
        {
          "name": "20020529 Vulnerability in Apache Tomcat v3.23 \u0026 v3.24 (part 2)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html"
        },
        {
          "name": "20020529 Vulnerability in Apache Tomcat v3.23 \u0026 v3.24",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.procheckup.com/security_info/vuln_pr0207.html"
        },
        {
          "name": "4877",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4877"
        },
        {
          "name": "4878",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4878"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-2007",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#116963",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/116963"
            },
            {
              "name": "4876",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4876"
            },
            {
              "name": "http://www.procheckup.com/security_info/vuln_pr0206.html",
              "refsource": "MISC",
              "url": "http://www.procheckup.com/security_info/vuln_pr0206.html"
            },
            {
              "name": "http://www.procheckup.com/security_info/vuln_pr0205.html",
              "refsource": "MISC",
              "url": "http://www.procheckup.com/security_info/vuln_pr0205.html"
            },
            {
              "name": "tomcat-sample-reveal-path(9208)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9208.php"
            },
            {
              "name": "20020529 Vulnerability in Apache Tomcat v3.23 \u0026 v3.24 (part 2)",
              "refsource": "BUGTRAQ",
              "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html"
            },
            {
              "name": "20020529 Vulnerability in Apache Tomcat v3.23 \u0026 v3.24",
              "refsource": "BUGTRAQ",
              "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html"
            },
            {
              "name": "http://www.procheckup.com/security_info/vuln_pr0207.html",
              "refsource": "MISC",
              "url": "http://www.procheckup.com/security_info/vuln_pr0207.html"
            },
            {
              "name": "4877",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4877"
            },
            {
              "name": "4878",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4878"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-2007",
    "datePublished": "2005-07-14T04:00:00Z",
    "dateReserved": "2005-07-14T00:00:00Z",
    "dateUpdated": "2024-09-17T00:21:13.825Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2002-2007\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-12-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC829C8E-1061-4F62-BA4B-FE5C7F11F209\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"143BA75E-A186-47EF-A18C-B1A1A1F61C00\"}]}]}],\"references\":[{\"url\":\"http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.iss.net/security_center/static/9208.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/116963\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.procheckup.com/security_info/vuln_pr0205.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.procheckup.com/security_info/vuln_pr0206.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.procheckup.com/security_info/vuln_pr0207.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/4876\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/4877\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/4878\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.iss.net/security_center/static/9208.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/116963\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.procheckup.com/security_info/vuln_pr0205.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.procheckup.com/security_info/vuln_pr0206.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.procheckup.com/security_info/vuln_pr0207.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/4876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/4877\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/4878\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…