ID

VAR-E-200607-0003


CVE

cve_id:CVE-2006-3835

Trust: 1.0

cve_id:CVE-2008-2938

Trust: 0.3

sources: BID: 30633 // EXPLOIT-DB: 28254

EDB ID

28254


TITLE

Apache Tomcat 5 - Information Disclosure - Multiple remote Exploit

Trust: 1.0

sources: EXPLOIT-DB: 28254

DESCRIPTION

Apache Tomcat 5 - Information Disclosure. CVE-2006-3835CVE-32723 . remote exploit for Multiple platform

Trust: 1.0

sources: EXPLOIT-DB: 28254

AFFECTED PRODUCTS

vendor:apachemodel:tomcatscope:eqversion:5

Trust: 1.0

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 02scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 01scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 10scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 16scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 11scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 17scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 19scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 2scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 07scope: - version: -

Trust: 0.6

vendor:wikidmodel:systems wikid serverscope:eqversion:3.0.4

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.5

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:sunmodel:jre 10-b03scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09scope: - version: -

Trust: 0.3

vendor:sunmodel:jre 1.5.0 08scope: - version: -

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.3

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:10.2

Trust: 0.3

vendor:redhatmodel:red hat network satellite serverscope:eqversion:5.0.1

Trust: 0.3

vendor:redhatmodel:red hat network satellite serverscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:red hat network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el5scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el4scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform .cp03scope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:developer suite as4scope:eqversion:3

Trust: 0.3

vendor:redhatmodel:application server ws4scope:eqversion:2

Trust: 0.3

vendor:redhatmodel:application server es4scope:eqversion:2

Trust: 0.3

vendor:redhatmodel:application server as4scope:eqversion:2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.3.1.0

Trust: 0.3

vendor:openjdkmodel:javascope:eqversion:1.6

Trust: 0.3

vendor:novellmodel:zenworks linux managementscope:eqversion:7.3

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:8.0.1

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:fujitsumodel:interstage job workload serverscope:eqversion:8.1

Trust: 0.3

vendor:fujitsumodel:interstage business application server enterprisescope:eqversion:8.0.0

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j edition 6.0ascope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage apworks modelers-j editionscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition ascope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.2

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plus developerscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0.1

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:6.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition ascope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.2

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:meeting exchange enterprise editionscope:eqversion: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0.0.52

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.6

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.5

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.4

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.3

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.16

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.15

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.14

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.13

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.12

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.11

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.10

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.9

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.8

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.7

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.4

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.26

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.25

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.24

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.23

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.22

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.21

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.20

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.19

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.18

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.17

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.16

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.15

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.14

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.13

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.12

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.11

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.10

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.9

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.8

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.7

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.4

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.37

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.36

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.34

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.32

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.31

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.30

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.29

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.28

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.24

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.12

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.10

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:4.1.9

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:4.1.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:4.1

Trust: 0.3

vendor:apachemodel:harmony m8scope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:harmony m7scope:eqversion:5.0

Trust: 0.3

vendor:wikidmodel:systems wikid serverscope:neversion:3.0.5

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform .cp04scope:neversion:4.2

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:6.0.18

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:5.5.27

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:4.1.39

Trust: 0.3

sources: BID: 30633 // EXPLOIT-DB: 28254

EXPLOIT

source: https://www.securityfocus.com/bid/19106/info

Apache Tomcat is prone to an information-disclosure vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to reveal a complete directory listing from any directory. Information obtained may aid in further attacks. Reports indicate that this issue may also allow attackers to obtain the source code of script files.

Apache Tomcat 5.028, 5.5.23, 5.5.9, and 5.5.7 are vulnerable to this issue; other versions may also be affected.

Novell GroupWise Mobile Server 1.0 or other versions bundled with Nokia Intellisync Mobile Suite 6.4.31.2, 6.6.0.107, and 6.6.2.2 ship with an affected version of Tomcat and are vulnerable as well.

http://www.example.com/;index.jsp

Trust: 1.0

sources: EXPLOIT-DB: 28254

EXPLOIT LANGUAGE

txt

Trust: 1.0

sources: EXPLOIT-DB: 28254

PRICE

free

Trust: 1.0

sources: EXPLOIT-DB: 28254

TYPE

Information Disclosure

Trust: 1.0

sources: EXPLOIT-DB: 28254

CREDITS

ScanAlert Security

Trust: 1.0

sources: EXPLOIT-DB: 28254

EXTERNAL IDS

db:BIDid:19106

Trust: 1.0

db:NVDid:CVE-2006-3835

Trust: 1.0

db:EXPLOIT-DBid:28254

Trust: 1.0

db:CERT/CCid:VU#343355

Trust: 0.3

db:NVDid:CVE-2008-2938

Trust: 0.3

db:BIDid:30633

Trust: 0.3

sources: BID: 30633 // EXPLOIT-DB: 28254

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2006-3835

Trust: 1.0

url:https://www.securityfocus.com/bid/19106/info

Trust: 1.0

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-201003e.html

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/343355

Trust: 0.3

url:https://sourceforge.net/project/shownotes.php?release_id=626903&group_id=144774

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0648.html

Trust: 0.3

url:http://download.novell.com/download?buildid=n5vszfht1vs

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7006398

Trust: 0.3

url:http://www.redhat.com/docs/en-us/jboss_enterprise_application_platform/4.2.0.cp04/html-single/readme/index.html

Trust: 0.3

url:http://harmony.apache.org/

Trust: 0.3

url:http://openjdk.java.net/

Trust: 0.3

url:http://java.sun.com/javase/6/webnotes/6u11.html

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_oracle_java1

Trust: 0.3

url:http://tomcat.apache.org/

Trust: 0.3

url:http://tomcat.apache.org/security-6.html

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2008-401.htm

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_oracle_java

Trust: 0.3

sources: BID: 30633 // EXPLOIT-DB: 28254

SOURCES

db:BIDid:30633
db:EXPLOIT-DBid:28254

LAST UPDATE DATE

2022-11-23T14:37:53.138000+00:00


SOURCES UPDATE DATE

db:BIDid:30633date:2015-04-13T22:13:00

SOURCES RELEASE DATE

db:BIDid:30633date:2008-08-11T00:00:00
db:EXPLOIT-DBid:28254date:2006-07-21T00:00:00