Lucene search

K
cve[email protected]CVE-2008-2370
HistoryAug 04, 2008 - 1:41 a.m.

CVE-2008-2370

2008-08-0401:41:00
CWE-22
web.nvd.nist.gov
67
4
cve-2008-2370
apache tomcat
directory traversal
vulnerability
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.3 High

AI Score

Confidence

High

0.019 Low

EPSS

Percentile

88.5%

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a … (dot dot) in a request parameter.

Affected configurations

NVD
Node
apachetomcatMatch4.1.0
OR
apachetomcatMatch4.1.1
OR
apachetomcatMatch4.1.2
OR
apachetomcatMatch4.1.3
OR
apachetomcatMatch4.1.4
OR
apachetomcatMatch4.1.5
OR
apachetomcatMatch4.1.6
OR
apachetomcatMatch4.1.7
OR
apachetomcatMatch4.1.8
OR
apachetomcatMatch4.1.9
OR
apachetomcatMatch4.1.10
OR
apachetomcatMatch4.1.11
OR
apachetomcatMatch4.1.12
OR
apachetomcatMatch4.1.13
OR
apachetomcatMatch4.1.14
OR
apachetomcatMatch4.1.15
OR
apachetomcatMatch4.1.16
OR
apachetomcatMatch4.1.17
OR
apachetomcatMatch4.1.18
OR
apachetomcatMatch4.1.19
OR
apachetomcatMatch4.1.20
OR
apachetomcatMatch4.1.21
OR
apachetomcatMatch4.1.22
OR
apachetomcatMatch4.1.23
OR
apachetomcatMatch4.1.24
OR
apachetomcatMatch4.1.25
OR
apachetomcatMatch4.1.26
OR
apachetomcatMatch4.1.27
OR
apachetomcatMatch4.1.28
OR
apachetomcatMatch4.1.29
OR
apachetomcatMatch4.1.30
OR
apachetomcatMatch4.1.31
OR
apachetomcatMatch4.1.32
OR
apachetomcatMatch4.1.33
OR
apachetomcatMatch4.1.34
OR
apachetomcatMatch4.1.35
OR
apachetomcatMatch4.1.36
OR
apachetomcatMatch4.1.37
OR
apachetomcatMatch5.5.0
OR
apachetomcatMatch5.5.1
OR
apachetomcatMatch5.5.2
OR
apachetomcatMatch5.5.3
OR
apachetomcatMatch5.5.4
OR
apachetomcatMatch5.5.5
OR
apachetomcatMatch5.5.6
OR
apachetomcatMatch5.5.7
OR
apachetomcatMatch5.5.8
OR
apachetomcatMatch5.5.9
OR
apachetomcatMatch5.5.10
OR
apachetomcatMatch5.5.11
OR
apachetomcatMatch5.5.12
OR
apachetomcatMatch5.5.13
OR
apachetomcatMatch5.5.14
OR
apachetomcatMatch5.5.15
OR
apachetomcatMatch5.5.16
OR
apachetomcatMatch5.5.17
OR
apachetomcatMatch5.5.18
OR
apachetomcatMatch5.5.19
OR
apachetomcatMatch5.5.20
OR
apachetomcatMatch5.5.21
OR
apachetomcatMatch5.5.22
OR
apachetomcatMatch5.5.23
OR
apachetomcatMatch5.5.24
OR
apachetomcatMatch5.5.25
OR
apachetomcatMatch5.5.26
OR
apachetomcatMatch6.0.0
OR
apachetomcatMatch6.0.1
OR
apachetomcatMatch6.0.2
OR
apachetomcatMatch6.0.3
OR
apachetomcatMatch6.0.4
OR
apachetomcatMatch6.0.5
OR
apachetomcatMatch6.0.6
OR
apachetomcatMatch6.0.7
OR
apachetomcatMatch6.0.8
OR
apachetomcatMatch6.0.9
OR
apachetomcatMatch6.0.10
OR
apachetomcatMatch6.0.11
OR
apachetomcatMatch6.0.12
OR
apachetomcatMatch6.0.13
OR
apachetomcatMatch6.0.14
OR
apachetomcatMatch6.0.15
OR
apachetomcatMatch6.0.16

References

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.3 High

AI Score

Confidence

High

0.019 Low

EPSS

Percentile

88.5%