Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7675

Опубликовано: 11 авг. 2017
Источник: debian
EPSS Низкий

Описание

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat9not-affectedpackage
tomcat8fixed8.5.16-1package
tomcat8fixed8.5.14-1+deb9u2stretchpackage
tomcat8not-affectedjessiepackage
tomcat7not-affectedpackage
tomcat6not-affectedpackage

Примечания

  • Fixed by: http://svn.apache.org/r1796091 (8.5.x)

  • https://bz.apache.org/bugzilla/show_bug.cgi?id=61120

EPSS

Процентиль: 88%
0.03809
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

CVSS3: 7.5
redhat
почти 8 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

CVSS3: 7.5
nvd
почти 8 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

CVSS3: 7.5
github
около 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat

fstec
около 8 лет назад

Уязвимость реализации HTTP/2 сервера приложений Apache Tomcat, позволяющая нарушителю обойти проверки безопасности

EPSS

Процентиль: 88%
0.03809
Низкий