CVE-2008-2370

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.

References

http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

http://marc.info/?l=bugtraq&m=123376588623823&w=2

http://marc.info/?l=bugtraq&m=139344343412337&w=2

http://secunia.com/advisories/31379

http://secunia.com/advisories/31381

http://secunia.com/advisories/31639

http://secunia.com/advisories/31865

http://secunia.com/advisories/31891

http://secunia.com/advisories/31982

http://secunia.com/advisories/32120

http://secunia.com/advisories/32222

http://secunia.com/advisories/32266

http://secunia.com/advisories/33797

http://secunia.com/advisories/33999

http://secunia.com/advisories/34013

http://secunia.com/advisories/35393

http://secunia.com/advisories/36249

http://secunia.com/advisories/37460

http://secunia.com/advisories/57126

http://securityreason.com/securityalert/4099

http://support.apple.com/kb/HT3216

http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm

http://tomcat.apache.org/security-4.html

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html

http://www.mandriva.com/security/advisories?name=MDVSA-2008:188

http://www.redhat.com/support/errata/RHSA-2008-0648.html

http://www.redhat.com/support/errata/RHSA-2008-0862.html

http://www.redhat.com/support/errata/RHSA-2008-0864.html

http://www.securityfocus.com/archive/1/495022/100/0/threaded

http://www.securityfocus.com/archive/1/507985/100/0/threaded

http://www.securityfocus.com/bid/30494

http://www.securityfocus.com/bid/31681

http://www.securitytracker.com/id?1020623

http://www.vmware.com/security/advisories/VMSA-2009-0002.html

http://www.vmware.com/security/advisories/VMSA-2009-0016.html

http://www.vupen.com/english/advisories/2008/2305

http://www.vupen.com/english/advisories/2008/2780

http://www.vupen.com/english/advisories/2008/2823

http://www.vupen.com/english/advisories/2009/0320

http://www.vupen.com/english/advisories/2009/0503

http://www.vupen.com/english/advisories/2009/1535

http://www.vupen.com/english/advisories/2009/2215

http://www.vupen.com/english/advisories/2009/3316

https://exchange.xforce.ibmcloud.com/vulnerabilities/44156

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10577

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5876

https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html

https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html

https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html

Details

Source: MITRE

Published: 2008-08-04

Updated: 2019-03-25

Type: CWE-22

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
89117VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check)NessusMisc.
critical
78226F5 Networks BIG-IP : Apache Tomcat information disclosure vulnerability (SOL9110)NessusF5 Networks Local Security Checks
medium
67733Oracle Linux 5 : tomcat (ELSA-2008-0648)NessusOracle Linux Local Security Checks
medium
63868RHEL 4 / 5 : jbossweb (RHSA-2008:0877)NessusRed Hat Local Security Checks
medium
60470Scientific Linux Security Update : tomcat on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
47578Apache Tomcat < 6.0.18 Multiple VulnerabilitiesNessusWeb Servers
medium
46867Apache Tomcat 4.x < 4.1.39 Multiple VulnerabilitiesNessusWeb Servers
medium
43842RHEL 4 : tomcat in Satellite Server (RHSA-2008:1007)NessusRed Hat Local Security Checks
medium
43703CentOS 5 : tomcat5 (CESA-2008:0648)NessusCentOS Local Security Checks
medium
42870VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.NessusVMware ESX Local Security Checks
medium
42178VMSA-2009-0002 : VirtualCenter Update 4 and ESX patch update Tomcat to version 5.5.27NessusVMware ESX Local Security Checks
medium
41596SuSE 10 Security Update : Websphere Community Edition (ZYPP Patch Number 5850)NessusSuSE Local Security Checks
high
36926Mandriva Linux Security Advisory : tomcat5 (MDVSA-2008:188)NessusMandriva Local Security Checks
medium
34374Mac OS X Multiple Vulnerabilities (Security Update 2008-007)NessusMacOS X Local Security Checks
critical
34227Fedora 8 : tomcat5-5.5.27-0jpp.2.fc8 (2008-8130)NessusFedora Local Security Checks
medium
34226Fedora 9 : tomcat5-5.5.27-0jpp.2.fc9 (2008-8113)NessusFedora Local Security Checks
medium
34185Fedora 9 : tomcat6-6.0.18-1.1.fc9 (2008-7977)NessusFedora Local Security Checks
medium
34057RHEL 5 : tomcat (RHSA-2008:0648)NessusRed Hat Local Security Checks
medium
4614Apache Tomcat 4.1.x < 4.1.39 / 5.5.x < 5.5.27 / 6.0.x < 6.0.18 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
800618Apache Tomcat < 4.1.37/5.5.26/6.0.16 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium