Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7675

Опубликовано: 10 авг. 2017
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 3tomcat8Not affected
Red Hat JBoss Fuse 6tomcat8Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-358
https://bugzilla.redhat.com/show_bug.cgi?id=1480626tomcat: Security Constraint Bypass

EPSS

Процентиль: 88%
0.03809
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

CVSS3: 7.5
nvd
почти 8 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.

CVSS3: 7.5
debian
почти 8 лет назад

The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8 ...

CVSS3: 7.5
github
около 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat

fstec
около 8 лет назад

Уязвимость реализации HTTP/2 сервера приложений Apache Tomcat, позволяющая нарушителю обойти проверки безопасности

EPSS

Процентиль: 88%
0.03809
Низкий

7.5 High

CVSS3