Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) , and (4) %20/, which leaks the pathname in an error message.
{
"github_reviewed": true,
"nvd_published_at": "2002-12-31T05:00:00Z",
"cwe_ids": [
"CWE-209"
],
"github_reviewed_at": "2025-04-03T16:15:45Z",
"severity": "MODERATE"
}