Description
Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message.
Remediation
References
Related Vulnerabilities
WordPress Plugin Display Widgets Spam Links Injection (2.6.3.1)
Joomla! Core Information Disclosure (1.5.0 - 3.7.5)
WordPress Plugin Social Login WP Cross-Site Request Forgery (5.0.0.0)
WordPress Plugin WP-Polls SQL Injection (2.61)
WordPress Plugin CoolClock-a Javascript Analog Clock Cross-Site Scripting (4.3.4)