First published: Mon Jul 13 2009(Updated: )
Oracle iPlanet Web Server (formerly Sun Java System Web Server or Sun ONE Web Server) 6.1 before SP12, and 7.0 through Update 6, when running on Windows, allows remote attackers to read arbitrary JSP files via an alternate data stream syntax, as demonstrated by a .jsp::$DATA URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Web Server | =7.0-update_5 | |
Sun Java System Web Server | =6.1-sp5 | |
Sun Java System Web Server | =6.1-sp8 | |
Sun Java System Web Server | =6.1-sp7 | |
Sun Java System Web Server | =6.1-sp9 | |
Sun Java System Web Server | =7.0-update_6 | |
Sun Java System Web Server | =6.1-sp11 | |
Sun Java System Web Server | =6.1-sp4 | |
Sun Java System Web Server | =6.1-sp10 | |
Sun Java System Web Server | =6.1 | |
Sun Java System Web Server | =6.1-sp6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2445 has a moderate severity level as it allows remote attackers to read arbitrary JSP files on affected systems.
To resolve CVE-2009-2445, you should update your Oracle iPlanet Web Server to version 7.0 SP12 or later, or to a patched version of 6.1.
CVE-2009-2445 affects Oracle iPlanet Web Server versions 6.1 before SP12 and 7.0 through Update 6 on Windows.
The impact of CVE-2009-2445 is that it allows unauthorized access to read sensitive content within JSP files.
There are no specific workarounds for CVE-2009-2445; the recommended action is to apply the relevant updates.