Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-2902

Опубликовано: 24 янв. 2010
Источник: redhat
CVSS2: 4.3
EPSS Средний

Описание

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

Отчет

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=559761tomcat: unexpected file deletion in work directory

EPSS

Процентиль: 93%
0.1008
Средний

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

nvd
больше 15 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.

debian
больше 15 лет назад

Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.2 ...

github
около 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat

oracle-oval
почти 15 лет назад

ELSA-2010-0580: tomcat5 security update (IMPORTANT)

EPSS

Процентиль: 93%
0.1008
Средний

4.3 Medium

CVSS2