Lucene search

K
githubGitHub Advisory DatabaseGHSA-FJ6C-PRGJ-GR3R
HistoryMay 14, 2022 - 1:17 a.m.

Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat

2022-05-1401:17:02
CWE-22
GitHub Advisory Database
github.com
15
apache tomcat
securitymanager
servletcontext
directory traversal attack
software

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.002

Percentile

53.0%

Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.

Affected configurations

Vulners
Node
org.apache.tomcattomcatRange5.5.0–5.5.30
OR
org.apache.tomcattomcatRange6.0.0–6.0.30
OR
org.apache.tomcattomcatRange7.0.0–7.0.4
VendorProductVersionCPE
org.apache.tomcattomcat*cpe:2.3:a:org.apache.tomcat:tomcat:*:*:*:*:*:*:*:*

References

CVSS2

1.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.002

Percentile

53.0%