Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-5515

Опубликовано: 08 июн. 2009
Источник: redhat
EPSS Высокий

Описание

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=504753tomcat request dispatcher information disclosure vulnerability

EPSS

Процентиль: 99%
0.72859
Высокий

Связанные уязвимости

ubuntu
почти 17 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.

nvd
почти 17 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.

debian
почти 17 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 throug ...

CVSS3: 5.3
github
почти 4 года назад

Directory Traversal in Apache Tomcat

oracle-oval
больше 16 лет назад

ELSA-2009-1164: tomcat security update (IMPORTANT)

EPSS

Процентиль: 99%
0.72859
Высокий