Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message.
https://exchange.xforce.ibmcloud.com/vulnerabilities/42915
http://www.securityfocus.com/bid/4557
http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-04/0297.html