JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about “deployed web contexts” via a request to the status servlet, as demonstrated by a full=true query string.
marc.info/?l=bugtraq&m=132698550418872&w=2
rhn.redhat.com/errata/RHSA-2008-0825.html
rhn.redhat.com/errata/RHSA-2008-0826.html
rhn.redhat.com/errata/RHSA-2008-0827.html
rhn.redhat.com/errata/RHSA-2008-0828.html
www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp03/html-single/readme/index.html
www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.3.0.cp01/html-single/readme/
www.securityfocus.com/bid/30540
www.securitytracker.com/id?1020628
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=457757
exchange.xforce.ibmcloud.com/vulnerabilities/44235
jira.jboss.org/jira/browse/JBPAPP-544