etsapp-tedge.bnymellon.com Open in urlscan Pro
170.61.134.19  Public Scan

Submitted URL: https://etsapp-tedge.bnymellon.com/TESrvEVMDownloadPwd?tblnum=1\u0026tblproc=N2021-09-27-09.30.04.331536ZTE1Q06\u0026tblseq=0000000...
Effective URL: https://etsapp-tedge.bnymellon.com/logoff.jsp?TYPE=33554433&REALMOID=06-000e54f2-0331-1a90-ac7c-2f7b0a00f041&GUID=&SMAUTHREASON=0&M...
Submission: On September 27 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

HTTP STATUS 400 – BAD REQUEST

--------------------------------------------------------------------------------

Type Exception Report

Message Invalid character found in the request target
[/logoff.jsp?TYPE=33554433&REALMOID=06-000e54f2-0331-1a90-ac7c-2f7b0a00f041&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-VxbMcSt%2feRWfnCabvN0KlFzV2Z6NDty9f8iJfzBJMzO39cH1Ry5khmwJfJabvdUAUh9kqTGCbhsqflVpvIV8SgRxSzU3U5rf&TARGET=-SM-HTTPS%3a%2f%2fetsapp--tedge%2ebnymellon%2ecom%2fTESrvEVMDownloadPwd%3ftblnum%3d1\u0026tblproc%3dN2021--09--27--09%2e30%2e04%2e331536ZTE1Q06\u0026tblseq%3d000000001\u0026tblevt%3d2021--09--15--18%2e05%2e41%2e025872\u0026tbldel%3d2021--09--03--16%2e29%2e37%2e588275\u0026stgtyp%3d\u0026tblname%3dTE_V_MSG_ENCRYPTED\u0026delopt%3d06].
The valid characters are defined in RFC 7230 and RFC 3986

Description The server cannot or will not process the request due to something
that is perceived to be a client error (e.g., malformed request syntax, invalid
request message framing, or deceptive request routing).

Exception

java.lang.IllegalArgumentException: Invalid character found in the request target [/logoff.jsp?TYPE=33554433&REALMOID=06-000e54f2-0331-1a90-ac7c-2f7b0a00f041&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-VxbMcSt%2feRWfnCabvN0KlFzV2Z6NDty9f8iJfzBJMzO39cH1Ry5khmwJfJabvdUAUh9kqTGCbhsqflVpvIV8SgRxSzU3U5rf&TARGET=-SM-HTTPS%3a%2f%2fetsapp--tedge%2ebnymellon%2ecom%2fTESrvEVMDownloadPwd%3ftblnum%3d1\u0026tblproc%3dN2021--09--27--09%2e30%2e04%2e331536ZTE1Q06\u0026tblseq%3d000000001\u0026tblevt%3d2021--09--15--18%2e05%2e41%2e025872\u0026tbldel%3d2021--09--03--16%2e29%2e37%2e588275\u0026stgtyp%3d\u0026tblname%3dTE_V_MSG_ENCRYPTED\u0026delopt%3d06]. The valid characters are defined in RFC 7230 and RFC 3986
	org.apache.coyote.http11.Http11InputBuffer.parseRequestLine(Http11InputBuffer.java:504)
	org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:503)
	org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:831)
	org.apache.tomcat.util.net.Nio2Endpoint$SocketProcessor.doRun(Nio2Endpoint.java:1620)
	org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	org.apache.tomcat.util.net.AbstractEndpoint.processSocket(AbstractEndpoint.java:1082)
	org.apache.tomcat.util.net.Nio2Endpoint$Nio2SocketWrapper$2.completed(Nio2Endpoint.java:565)
	org.apache.tomcat.util.net.Nio2Endpoint$Nio2SocketWrapper$2.completed(Nio2Endpoint.java:543)
	org.apache.tomcat.util.net.SecureNio2Channel$1.completed(SecureNio2Channel.java:969)
	org.apache.tomcat.util.net.SecureNio2Channel$1.completed(SecureNio2Channel.java:898)
	sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)
	sun.nio.ch.Invoker$2.run(Invoker.java:218)
	sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)
	java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
	java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java)
	org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	java.lang.Thread.run(Thread.java:748)


Note The full stack trace of the root cause is available in the server logs.

--------------------------------------------------------------------------------


APACHE TOMCAT/8.5.61