Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://marc.info/?l=bugtraq&m=130168502603566&w=2
http://marc.info/?l=bugtraq&m=132215163318824&w=2
http://marc.info/?l=bugtraq&m=136485229118404&w=2
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://secunia.com/advisories/43192
http://secunia.com/advisories/45022
http://secunia.com/advisories/57126
http://securityreason.com/securityalert/8072
http://support.apple.com/kb/HT5002
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://www.debian.org/security/2011/dsa-2160
http://www.mandriva.com/security/advisories?name=MDVSA-2011:030
http://www.redhat.com/support/errata/RHSA-2011-0791.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://www.redhat.com/support/errata/RHSA-2011-1845.html
http://www.securityfocus.com/archive/1/516211/100/0/threaded
http://www.securityfocus.com/bid/46177
http://www.securitytracker.com/id?1025025
https://exchange.xforce.ibmcloud.com/vulnerabilities/65159
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12517
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13969
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19379
Source: MITRE
Published: 2011-02-10
Updated: 2019-03-25
Type: NVD-CWE-Other
Base Score: 1.2
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 1.9
Severity: LOW
OR
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
OR
cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*
OR
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
75761 | openSUSE Security Update : tomcat6 (openSUSE-SU-2011:0146-1) | Nessus | SuSE Local Security Checks | medium |
68410 | Oracle Linux 5 : tomcat5 (ELSA-2011-1845) | Nessus | Oracle Linux Local Security Checks | medium |
61211 | Scientific Linux Security Update : tomcat5 on SL5.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | medium |
61051 | Scientific Linux Security Update : tomcat6 on SL6.x i386/x86_64 | Nessus | Scientific Linux Local Security Checks | medium |
59677 | GLSA-201206-24 : Apache Tomcat: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | high |
57356 | RHEL 5 : tomcat5 (RHSA-2011:1845) | Nessus | Red Hat Local Security Checks | medium |
57354 | CentOS 5 : tomcat5 (CESA-2011:1845) | Nessus | CentOS Local Security Checks | medium |
56573 | Fedora 14 : tomcat6-6.0.26-27.fc14 (2011-13457) | Nessus | Fedora Local Security Checks | high |
56481 | Mac OS X Multiple Vulnerabilities (Security Update 2011-006) | Nessus | MacOS X Local Security Checks | critical |
54601 | RHEL 6 : tomcat6 (RHSA-2011:0791) | Nessus | Red Hat Local Security Checks | medium |
53807 | openSUSE Security Update : tomcat6 (openSUSE-SU-2011:0146-1) | Nessus | SuSE Local Security Checks | medium |
53221 | Ubuntu 9.10 / 10.04 LTS / 10.10 : tomcat6 vulnerabilities (USN-1097-1) | Nessus | Ubuntu Local Security Checks | medium |
52711 | SuSE9 Security Update : Tomcat (YOU Patch Number 12687) | Nessus | SuSE Local Security Checks | medium |
52525 | SuSE 10 Security Update : Tomcat (ZYPP Patch Number 7337) | Nessus | SuSE Local Security Checks | medium |
52035 | Mandriva Linux Security Advisory : tomcat5 (MDVSA-2011:030) | Nessus | Mandriva Local Security Checks | medium |
51975 | Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities | Nessus | Web Servers | medium |
51959 | Debian DSA-2160-1 : tomcat6 - several vulnerabilities | Nessus | Debian Local Security Checks | medium |
800608 | Apache Tomcat 7.0.x < 7.0.4 File Permission Bypass Vulnerability | Log Correlation Engine | Web Servers | low |
5792 | Apache Tomcat 7.0.x < 7.0.4 SecurityManager Local Security Bypass | Nessus Network Monitor | Web Servers | medium |
800613 | Apache Tomcat 5.5.x < 5.5.30 Multiple Vulnerabilities | Log Correlation Engine | Web Servers | medium |
800609 | Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities | Log Correlation Engine | Web Servers | medium |
5789 | Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | medium |
5786 | Apache Tomcat 5.5.x < 5.5.30 Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | medium |
51958 | Apache Tomcat 7.x < 7.0.4 SecurityManager Local Security Bypass | Nessus | Web Servers | medium |
47749 | Apache Tomcat 5.5.x < 5.5.30 | Nessus | Web Servers | medium |