Apache Tomcat Directory Traversal

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by a directory traversal
vulnerability.

Description :

The remote web server proxies certain requests to an Apache Tomcat
server and allows directory traversal attacks due to Tomcat allowing
'/', '\', and '%5c' characters as directory separators.

By sending a specially crafted request, it is possible for an attacker
to break out of the given context and access web applications that may
not otherwise be proxied to the Tomcat web server.

See also :

http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://www.securityfocus.com/archive/1/462791/100/0/threaded

Solution :

Upgrade to Apache Tomcat 5.5.22 / 6.0.10 / 4.1.36 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 43623 ()

Bugtraq ID: 22960

CVE ID: CVE-2007-0450