IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the /servlet/file string.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Websphere_application_server | Ibm | 2.0 (including) | 2.0 (including) |
Websphere_application_server | Ibm | 3.0 (including) | 3.0 (including) |
Websphere_application_server | Ibm | 3.0.21 (including) | 3.0.21 (including) |