Pramati Server 3.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").Referenceshttp://www.securityfocus.com/bid/5119http://www.iss.net/security_center/static/9446.phphttp://www.westpoint.ltd.uk/advisories/wp-02-0002.txthttp://online.securityfocus.com/archive/1/279582