Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-2370

Опубликовано: 01 авг. 2008
Источник: redhat
EPSS Высокий

Описание

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=457934tomcat RequestDispatcher information disclosure vulnerability

EPSS

Процентиль: 99%
0.88991
Высокий

Связанные уязвимости

ubuntu
почти 17 лет назад

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.

nvd
почти 17 лет назад

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.

debian
почти 17 лет назад

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 th ...

github
около 3 лет назад

Apache Tomcat Path Traversal Vulnerability

oracle-oval
почти 17 лет назад

ELSA-2008-0648: tomcat security update (IMPORTANT)

EPSS

Процентиль: 99%
0.88991
Высокий