Lucene search

K
f5F5F5:K30971148
HistoryMar 23, 2016 - 12:00 a.m.

K30971148 : Apache Tomcat 6.x vulnerability CVE-2015-5174

2016-03-2300:00:00
my.f5.com
24

AI Score

6.3

Confidence

Low

EPSS

0.002

Percentile

61.9%

Security Advisory Description

Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /… (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. (CVE-2015-5174)

Impact

A remote authenticated user may bypass the security manager to obtain a directory listing for the directory where the web application was deployed.

  • BIG-IP/Enterprise Manager

The level of access required to create and deploy a malicious web application implies a user with a significant trust level (for example: root). BIG-IP and Enterprise Manager systems do not support customized web applications within the Tomcat configuration.

  • Traffix SDC

Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.