CVE-2007-5461

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.

References

http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html

http://issues.apache.org/jira/browse/GERONIMO-3549

http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html

http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%[email protected]%3E

http://marc.info/?l=bugtraq&m=139344343412337&w=2

http://marc.info/?l=full-disclosure&m=119239530508382

http://rhn.redhat.com/errata/RHSA-2008-0630.html

http://secunia.com/advisories/27398

http://secunia.com/advisories/27446

http://secunia.com/advisories/27481

http://secunia.com/advisories/27727

http://secunia.com/advisories/28317

http://secunia.com/advisories/28361

http://secunia.com/advisories/29242

http://secunia.com/advisories/29313

http://secunia.com/advisories/29711

http://secunia.com/advisories/30676

http://secunia.com/advisories/30802

http://secunia.com/advisories/30899

http://secunia.com/advisories/30908

http://secunia.com/advisories/31493

http://secunia.com/advisories/32120

http://secunia.com/advisories/32222

http://secunia.com/advisories/32266

http://secunia.com/advisories/37460

http://secunia.com/advisories/57126

http://security.gentoo.org/glsa/glsa-200804-10.xml

http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1

http://support.apple.com/kb/HT2163

http://support.apple.com/kb/HT3216

http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm

http://tomcat.apache.org/security-4.html

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://www.debian.org/security/2008/dsa-1447

http://www.debian.org/security/2008/dsa-1453

http://www.mandriva.com/security/advisories?name=MDKSA-2007:241

http://www.mandriva.com/security/advisories?name=MDVSA-2009:136

http://www.redhat.com/support/errata/RHSA-2008-0042.html

http://www.redhat.com/support/errata/RHSA-2008-0195.html

http://www.redhat.com/support/errata/RHSA-2008-0261.html

http://www.redhat.com/support/errata/RHSA-2008-0862.html

http://www.securityfocus.com/archive/1/507985/100/0/threaded

http://www.securityfocus.com/bid/26070

http://www.securityfocus.com/bid/31681

http://www.securitytracker.com/id?1018864

http://www.vmware.com/security/advisories/VMSA-2008-0010.html

http://www.vmware.com/security/advisories/VMSA-2009-0016.html

http://www.vupen.com/english/advisories/2007/3622

http://www.vupen.com/english/advisories/2007/3671

http://www.vupen.com/english/advisories/2007/3674

http://www.vupen.com/english/advisories/2008/1856/references

http://www.vupen.com/english/advisories/2008/1979/references

http://www.vupen.com/english/advisories/2008/1981/references

http://www.vupen.com/english/advisories/2008/2780

http://www.vupen.com/english/advisories/2008/2823

http://www.vupen.com/english/advisories/2009/3316

http://www-1.ibm.com/support/docview.wss?uid=swg21286112

https://exchange.xforce.ibmcloud.com/vulnerabilities/37243

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202

https://www.exploit-db.com/exploits/4530

https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html

Details

Source: MITRE

Published: 2007-10-15

Updated: 2019-03-25

Type: CWE-22

Risk Information

CVSS v2

Base Score: 3.5

Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 6.8

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*

Tenable Plugins

View all (30 total)

IDNameProductFamilySeverity
89117VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check)NessusMisc.
critical
67640Oracle Linux 5 : tomcat (ELSA-2008-0042)NessusOracle Linux Local Security Checks
medium
63851RHEL 5 : JBoss EAP (RHSA-2008:0213)NessusRed Hat Local Security Checks
high
63848RHEL 4 : JBoss EAP (RHSA-2008:0151)NessusRed Hat Local Security Checks
high
60371Scientific Linux Security Update : tomcat on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
47577Apache Tomcat < 6.0.16 Multiple VulnerabilitiesNessusWeb Servers
medium
47576Apache Tomcat < 5.5.26 Multiple VulnerabilitiesNessusWeb Servers
medium
47030Apache Tomcat 4.x < 4.1.37 Multiple VulnerabilitiesNessusWeb Servers
medium
43840RHEL 4 : Satellite Server (RHSA-2008:0630)NessusRed Hat Local Security Checks
medium
43837RHEL 3 / 4 : Satellite Server (RHSA-2008:0524)NessusRed Hat Local Security Checks
critical
43835RHEL 4 : Satellite Server (RHSA-2008:0261)NessusRed Hat Local Security Checks
critical
43669CentOS 5 : tomcat (CESA-2008:0042)NessusCentOS Local Security Checks
medium
42870VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.NessusVMware ESX Local Security Checks
medium
41596SuSE 10 Security Update : Websphere Community Edition (ZYPP Patch Number 5850)NessusSuSE Local Security Checks
high
40379VMSA-2008-0010 : Updated Tomcat and Java JRE packages for VMware ESX 3.5 and VirtualCenterNessusVMware ESX Local Security Checks
critical
40371VMSA-2008-00010 : Updated Tomcat and Java JRE packages for VMware, ESX 3.5 and VirtualCenter 2.5 (DEPRECATED)NessusVMware ESX Local Security Checks
critical
39485Mandriva Linux Security Advisory : tomcat5 (MDVSA-2009:136)NessusMandriva Local Security Checks
medium
38147Mandrake Linux Security Advisory : tomcat5 (MDKSA-2007:241)NessusMandriva Local Security Checks
medium
34374Mac OS X Multiple Vulnerabilities (Security Update 2008-007)NessusMacOS X Local Security Checks
critical
33282Mac OS X Multiple Vulnerabilities (Security Update 2008-004)NessusMacOS X Local Security Checks
critical
33281Mac OS X 10.5.x < 10.5.4 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
31957GLSA-200804-10 : Tomcat: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
31448RHEL 5 : tomcat (RHSA-2008:0042)NessusRed Hat Local Security Checks
medium
29872Debian DSA-1453-1 : tomcat5 - several vulnerabilitiesNessusDebian Local Security Checks
medium
29856Debian DSA-1447-1 : tomcat5.5 - several vulnerabilitiesNessusDebian Local Security Checks
medium
28258Fedora 8 : tomcat5-5.5.25-1jpp.1.fc8 (2007-3474)NessusFedora Local Security Checks
medium
28257Fedora 7 : tomcat5-5.5.25-1jpp.1.fc7 (2007-3456)NessusFedora Local Security Checks
medium
4245Apache Tomcat < 6.0.15 WEBDAV Lock Request Information Disclosure (deprecated)Nessus Network MonitorWeb Servers
medium
4564Mac OS X < 10.5.4 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
800601Apache Tomcat < 6.0.15 WEBDAV Lock Request Information DisclosureLog Correlation EngineWeb Servers
low