Apache Tomcat Directory Traversal

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server is affected by a directory traversal

Description :

The remote web server proxies certain requests to an Apache Tomcat
server and allows directory traversal attacks due to Tomcat allowing
'/', '\', and '%5c' characters as directory separators.

By sending a specially crafted request, it is possible for an attacker
to break out of the given context and access web applications that may
not otherwise be proxied to the Tomcat web server.

See also :


Solution :

Upgrade to Apache Tomcat 5.5.22 / 6.0.10 / 4.1.36 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 43623 ()

Bugtraq ID: 22960

CVE ID: CVE-2007-0450

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial