Description
Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message.
Remediation
References
Related Vulnerabilities
WordPress Plugin Product Catalog Arbitrary File Upload (3.1.1)
WordPress Plugin I Recommend This SQL Injection (3.7.2)
WordPress Plugin Conditional Marketing Mailer for WooCommerce Unspecified Vulnerability (1.6)
Internet Information Services Other Vulnerability (CVE-1999-1451)
WordPress Plugin Candidate Application Form Arbitrary File Download (1.0)