CVE-2002-1148
Published Oct 11, 2002
Last updated a year ago
Overview
- Description
- The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAFF8D91-80A2-454A-8B44-A5A889002692" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEC42876-65AD-476A-8B62-25D4E15D1BB6" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "724A8FF9-8089-4302-8200-08987A712988" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F97DDB7-E32B-422F-8AEA-07C75DEAD36E" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7079F63C-7CA8-4909-A9C8-45C4C1C1C186" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BE08AEE-4801-4FAF-97AD-BBD5C5849E3D" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC829C8E-1061-4F62-BA4B-FE5C7F11F209" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "143BA75E-A186-47EF-A18C-B1A1A1F61C00" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0CDF9E1-9412-450E-B1D4-438F128FFF9E" }, { "criteria": "cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32561F50-6385-4D71-AFAC-3D2F8DB55A4B" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "914E1404-01A2-4F94-AA40-D5EA20F55AD3" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81FB1106-B26D-45BE-A511-8E69131BBA52" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "401A213A-FED3-49C0-B823-2E02EA528905" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BFE5AD8-DB14-4632-9D2A-F2013579CA7D" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7641278D-3B8B-4CD2-B284-2047B65514A2" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E300013-0CE7-4313-A553-74A6A247B3E9" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7E52BE7-5281-4430-8846-E41CF34FC214" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBDA8066-294D-431E-B026-C03707DFBCD5" }, { "criteria": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C92F3744-C8F9-4E29-BF1A-25E03A32F2C0" } ], "operator": "OR" } ] } ]