Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /… (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. (CVE-2015-5174)
Impact
A remote authenticated user may bypass the security manager to obtain a directory listing for the directory where the web application was deployed.
The level of access required to create and deploy a malicious web application implies a user with a significant trust level (for example: root). BIG-IP and Enterprise Manager systems do not support customized web applications within the Tomcat configuration.
Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.