This vulnerability occurs when a J2EE application uses the server's default error pages instead of custom ones, potentially leaking sensitive system details.
A secure web application must define custom error pages for all client-side (4xx) and server-side (5xx) errors, and also catch generic Throwable exceptions. This prevents the application container from sending its built-in error responses, which often include stack traces, server versions, and internal configuration details that attackers can use to map your system. When attackers probe for weaknesses, the information your application reveals directly influences their success. By replacing default error pages with neutral, user-friendly messages, you remove a critical source of intelligence that could enable more targeted and damaging exploits.
Impact: Read Application Data
A stack trace might show the attacker a malformed SQL query string, the type of database being used, and the version of the application container. This information enables the attacker to target known vulnerabilities in these components.
java