We found results for “”
CVE-2015-5174
Good to know:
Date: February 24, 2016
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
Language: Java
Severity Score
Related Resources (63)
Severity Score
Weakness Type (CWE)
Path Traversal
CWE-22Top Fix
Upgrade Version
Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:8.0.27,7.0.65,org.apache.tomcat:tomcat-coyote:8.0.27,7.0.65,org.apache.tomcat:catalina:6.0.45
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | SINGLE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |