Lucene search

K
nvd[email protected]NVD:CVE-2015-5174
HistoryFeb 25, 2016 - 1:59 a.m.

CVE-2015-5174

2016-02-2501:59:00
CWE-22
web.nvd.nist.gov

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

6 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

55.7%

Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /… (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.

Affected configurations

NVD
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
Node
apachetomcatMatch6.0.0
OR
apachetomcatMatch6.0.0alpha
OR
apachetomcatMatch6.0.1
OR
apachetomcatMatch6.0.1alpha
OR
apachetomcatMatch6.0.2
OR
apachetomcatMatch6.0.2alpha
OR
apachetomcatMatch6.0.2beta
OR
apachetomcatMatch6.0.4
OR
apachetomcatMatch6.0.4alpha
OR
apachetomcatMatch6.0.10
OR
apachetomcatMatch6.0.11
OR
apachetomcatMatch6.0.13
OR
apachetomcatMatch6.0.14
OR
apachetomcatMatch6.0.16
OR
apachetomcatMatch6.0.18
OR
apachetomcatMatch6.0.20
OR
apachetomcatMatch6.0.24
OR
apachetomcatMatch6.0.26
OR
apachetomcatMatch6.0.28
OR
apachetomcatMatch6.0.29
OR
apachetomcatMatch6.0.30
OR
apachetomcatMatch6.0.32
OR
apachetomcatMatch6.0.33
OR
apachetomcatMatch6.0.35
OR
apachetomcatMatch6.0.36
OR
apachetomcatMatch6.0.37
OR
apachetomcatMatch6.0.39
OR
apachetomcatMatch6.0.41
OR
apachetomcatMatch6.0.43
OR
apachetomcatMatch6.0.44
OR
apachetomcatMatch7.0.0beta
OR
apachetomcatMatch7.0.2beta
OR
apachetomcatMatch7.0.4beta
OR
apachetomcatMatch7.0.5beta
OR
apachetomcatMatch7.0.6
OR
apachetomcatMatch7.0.10
OR
apachetomcatMatch7.0.11
OR
apachetomcatMatch7.0.12
OR
apachetomcatMatch7.0.14
OR
apachetomcatMatch7.0.16
OR
apachetomcatMatch7.0.19
OR
apachetomcatMatch7.0.20
OR
apachetomcatMatch7.0.21
OR
apachetomcatMatch7.0.22
OR
apachetomcatMatch7.0.23
OR
apachetomcatMatch7.0.25
OR
apachetomcatMatch7.0.26
OR
apachetomcatMatch7.0.27
OR
apachetomcatMatch7.0.28
OR
apachetomcatMatch7.0.29
OR
apachetomcatMatch7.0.30
OR
apachetomcatMatch7.0.32
OR
apachetomcatMatch7.0.33
OR
apachetomcatMatch7.0.34
OR
apachetomcatMatch7.0.35
OR
apachetomcatMatch7.0.37
OR
apachetomcatMatch7.0.39
OR
apachetomcatMatch7.0.40
OR
apachetomcatMatch7.0.41
OR
apachetomcatMatch7.0.42
OR
apachetomcatMatch7.0.47
OR
apachetomcatMatch7.0.50
OR
apachetomcatMatch7.0.52
OR
apachetomcatMatch7.0.53
OR
apachetomcatMatch7.0.54
OR
apachetomcatMatch7.0.55
OR
apachetomcatMatch7.0.56
OR
apachetomcatMatch7.0.57
OR
apachetomcatMatch7.0.59
OR
apachetomcatMatch7.0.61
OR
apachetomcatMatch7.0.62
OR
apachetomcatMatch7.0.63
OR
apachetomcatMatch7.0.64
OR
apachetomcatMatch8.0.0rc1
OR
apachetomcatMatch8.0.0rc10
OR
apachetomcatMatch8.0.0rc3
OR
apachetomcatMatch8.0.0rc5
OR
apachetomcatMatch8.0.1
OR
apachetomcatMatch8.0.11
OR
apachetomcatMatch8.0.12
OR
apachetomcatMatch8.0.14
OR
apachetomcatMatch8.0.15
OR
apachetomcatMatch8.0.17
OR
apachetomcatMatch8.0.18
OR
apachetomcatMatch8.0.20
OR
apachetomcatMatch8.0.21
OR
apachetomcatMatch8.0.22
OR
apachetomcatMatch8.0.23
OR
apachetomcatMatch8.0.24
OR
apachetomcatMatch8.0.26
Node
canonicalubuntu_linuxMatch12.04lts
OR
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch15.10
OR
canonicalubuntu_linuxMatch16.04lts

References

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

6 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

55.7%