Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-2094
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Joe Testa hellbent 01 allows remote attackers to determine the full path of the web root directory via a GET request with a relative path that includes the root's parent, which generates a 403 error message if the parent is incorrect, but a normal response if the parent is correct.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Joe Testa hellbent可利用相对路径猜测Web安装目录漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
hellbent是一个由Joe Testa维护的Java服务器程序。 hellbent实现上存在问题,远程攻击者可能利用这个问题猜测到Web目录的安装路径。 如果hellbent收到在请求中包含"../"字串的相对目录,当情况是先出Web目录,然后再进回到Web目录时,服务器会回应200 OK消息,如果情况是先出Web目录,而没有再进回到正确的Web目录时,服务器会回应403 Forbidden消息。因此对攻击者来说,通过暴力猜测可能得到Web的安装目录信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-2094
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-2094
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2002-2094

No comments yet


Leave a comment