Lucene search

K
githubGitHub Advisory DatabaseGHSA-9737-QMGC-HFR9
HistoryMay 14, 2022 - 1:17 a.m.

Directory Traversal in Apache Tomcat

2022-05-1401:17:23
CWE-22
GitHub Advisory Database
github.com
13

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

73.5%

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via … (dot dot) sequences and the WEB-INF directory in a Request.

Affected configurations

Vulners
Node
org.apache.tomcat\Matchtomcat
OR
org.apache.tomcat\Matchtomcat
OR
org.apache.tomcat\Matchtomcat

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

73.5%