Search for vulnerabilities
Vulnerability details: VCID-8xq4-qp4b-aaah
Vulnerability ID VCID-8xq4-qp4b-aaah
Aliases CVE-2002-2007
Summary The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows remote attackers to obtain sensitive system information such as directory listings and web root path, via erroneous HTTP requests for Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3) examples/jsp directories, or the (4) test/realPath.jsp servlet, which leaks pathnames in error messages.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00248 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.00352 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.19989 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
epss 0.22609 https://api.first.org/data/v1/epss?cve=CVE-2002-2007
apache_tomcat Moderate https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2007
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2002-2007
Reference id Reference type URL
http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00272.html
http://cert.uni-stuttgart.de/archive/bugtraq/2002/05/msg00275.html
https://api.first.org/data/v1/epss?cve=CVE-2002-2007
http://www.iss.net/security_center/static/9208.php
http://www.kb.cert.org/vuls/id/116963
http://www.procheckup.com/security_info/vuln_pr0205.html
http://www.procheckup.com/security_info/vuln_pr0206.html
http://www.procheckup.com/security_info/vuln_pr0207.html
http://www.securityfocus.com/bid/4876
http://www.securityfocus.com/bid/4877
http://www.securityfocus.com/bid/4878
cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*
CVE-2002-2007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2007
CVE-2002-2007 https://nvd.nist.gov/vuln/detail/CVE-2002-2007
CVE-2002-2007;OSVDB-13304 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21490.txt
CVE-2002-2007;OSVDB-13304 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21491.txt
CVE-2002-2007;OSVDB-13304 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21492.txt
CVE-2002-2007;OSVDB-13304 Exploit https://www.securityfocus.com/bid/4876/info
CVE-2002-2007;OSVDB-13304 Exploit https://www.securityfocus.com/bid/4877/info
CVE-2002-2007;OSVDB-13304 Exploit https://www.securityfocus.com/bid/4878/info
Data source Exploit-DB
Date added May 29, 2002
Description Apache Tomcat 3.2.3/3.2.4 - Example Files Web Root Full Path Disclosure
Ransomware campaign use Known
Source publication date May 29, 2002
Exploit type remote
Platform multiple
Source update date Sept. 23, 2012
Source URL https://www.securityfocus.com/bid/4877/info
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2002-2007
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.65221
EPSS Score 0.00248
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.