Описание
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat JBoss BRMS 5 | jbossweb | Will not fix | ||
Red Hat JBoss Data Grid 6 | jbossweb | Affected | ||
Red Hat JBoss Enterprise Application Platform 4 | jbossweb | Will not fix | ||
Red Hat JBoss Enterprise Application Platform 5 | jbossweb | Will not fix | ||
Red Hat JBoss Enterprise Web Server 2 | tomcat6 | Will not fix | ||
Red Hat JBoss Fuse Service Works 6 | jbossweb | Will not fix | ||
Red Hat JBoss Operations Network 3 | jbossweb | Affected | ||
Red Hat JBoss Portal 6 | jbossweb | Affected | ||
Red Hat Enterprise Linux 6 | tomcat6 | Fixed | RHSA-2016:2045 | 10.10.2016 |
Red Hat Enterprise Linux 7 | tomcat | Fixed | RHSA-2016:2599 | 03.11.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS3
4 Medium
CVSS2
Связанные уязвимости
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat ...
Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat
Уязвимость сервера приложений Apache Tomcat, позволяющая нарушителю обойти ограничения проверки подлинности
EPSS
4.3 Medium
CVSS3
4 Medium
CVSS2