There is an insecure default configuration in Apache Tomcat web server that places several sample applications in the webroot. Remote users may be able to use these applications to gain sensitive information about the server's configuration.
There are several sample applications that ship with Apache Tomcat, and are installed in the webroot by default. If these applications are left in the webroot of a production machine, remote users may be able to gain sensitive information about the server's configuration.
A remote user may be able to gain sensitive information about the server's configuration.
The CERT/CC is currently unaware of a practical solution to this problem.
Remove the sample files prior to placing the server into production.
Thanks to ProCheckUp for reporting this vulnerability.
This document was written by Jason A Rafail.
|Date First Published:||2002-06-11|
|Date Last Updated:||2002-06-11 20:32 UTC|