---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: IBM WebSphere Application Server JSP Source Exposure SECUNIA ADVISORY ID: SA14962 VERIFY ADVISORY: http://secunia.com/advisories/14962/ CRITICAL: Less critical IMPACT: Exposure of sensitive information WHERE: >From remote SOFTWARE: IBM WebSphere Application Server 6.x http://secunia.com/product/4651/ DESCRIPTION: SPI Labs has reported a vulnerability in IBM WebSphere Application Server, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an error in the request handling in certain configurations where the document root of the web server equals to the document root of the application server. This can be exploited to disclose the source of JSP scripts by sending a specially crafted request with a non-existing "Host" HTTP header. The vulnerability has been reported in version 6. Other versions may also be affected. SOLUTION: Do not share the document root of the web server with the document root of the application server. PROVIDED AND/OR DISCOVERED BY: SPI Labs ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------