Apache Tomcat Directory Traversal

This script is Copyright (C) 2010-2012 Tenable Network Security, Inc.


Synopsis :

The remote web server is vulnerable to a directory traversal
attack.

Description :

The remote web server proxies certain requests to an Apache Tomcat
server and allows for directory traversal attacks against that because
Tomcat allows '/', '\', and '%5c' characters as directory separators.

By sending a specially crafted request, it is possible for an attacker
to break out of the given context and access web applications that may
not otherwise be proxied to the Tomcat web server.

See also :

http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://www.securityfocus.com/archive/1/462791/100/0/threaded

Solution :

Upgrade to Apache Tomcat 5.5.22 / 6.0.10 / 4.1.36 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 43623 ()

Bugtraq ID: 22960

CVE ID: CVE-2007-0450