IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the /servlet/file string.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Websphere_application_server | Ibm | 2.0 (including) | 2.0 (including) |
| Websphere_application_server | Ibm | 3.0 (including) | 3.0 (including) |
| Websphere_application_server | Ibm | 3.0.21 (including) | 3.0.21 (including) |