Apache Tomcat Directory Traversal

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server is affected by a directory traversal

Description :

The remote web server proxies certain requests to an Apache Tomcat
server and allows directory traversal attacks due to Tomcat allowing
'/', '\', and '%5c' characters as directory separators.

By sending a specially crafted request, it is possible for an attacker
to break out of the given context and access web applications that may
not otherwise be proxied to the Tomcat web server.

See also :


Solution :

Upgrade to Apache Tomcat 5.5.22 / 6.0.10 / 4.1.36 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 5.0
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 43623 ()

Bugtraq ID: 22960

CVE ID: CVE-2007-0450

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now