F5 Networks BIG-IP : Apache Tomcat 6.x vulnerability (K30971148)
Medium Nessus Plugin ID 97421
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionDirectory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory. (CVE-2015-5174)
A remote authenticated user may bypass the security manager to obtain a directory listing for the directory where the web application was deployed.
The level of access required to create and deploy a malicious web application implies a user with a significant trust level (for example: root). BIG-IP and Enterprise Manager systems do not support customized web applications within the Tomcat configuration.
Traffix SDC Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.
SolutionUpgrade to one of the non-vulnerable versions listed in the F5 Solution K30971148.