First published: Fri Oct 11 2002(Updated: )
The default servlet (`org.apache.catalina.servlets.DefaultServlet`) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=4.1.0<=4.1.10 | 4.1.12 |
maven/org.apache.tomcat:tomcat | >=4.0.0<=4.0.4 | 4.0.5 |
Tomcat | =3.0 | |
Tomcat | =3.1 | |
Tomcat | =3.1.1 | |
Tomcat | =3.2 | |
Tomcat | =3.2.1 | |
Tomcat | =3.2.2-beta2 | |
Tomcat | =3.2.3 | |
Tomcat | =3.2.4 | |
Tomcat | =3.3 | |
Tomcat | =3.3.1 | |
Tomcat | =4.0.0 | |
Tomcat | =4.0.1 | |
Tomcat | =4.0.2 | |
Tomcat | =4.0.3 | |
Tomcat | =4.0.4 | |
Tomcat | =4.1.0 | |
Tomcat | =4.1.3-beta | |
Tomcat | =4.1.9-beta | |
Tomcat | =4.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1148 is considered a critical vulnerability as it allows unauthorized access to server source code.
To fix CVE-2002-1148, upgrade to Apache Tomcat version 4.1.12 or higher for the 4.x branch, and 4.0.5 or higher for the 4.0.x branch.
Affected versions of Apache Tomcat include 3.0, 3.1, 3.2, 4.0.0 through 4.1.10, and related beta versions.
Failing to address CVE-2002-1148 can lead to significant data breaches as attackers can access sensitive server files.
CVE-2002-1148 can be exploited by making a direct request to the default servlet, enabling remote attackers to read source code.