Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-5461

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-15 Oct, 2007 | 18:00
Updated At-07 Aug, 2024 | 15:31
Rejected At-
Credits

Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:15 Oct, 2007 | 18:00
Updated At:07 Aug, 2024 | 15:31
Rejected At:
▼CVE Numbering Authority (CNA)

Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2008/dsa-1453
vendor-advisory
x_refsource_DEBIAN
http://tomcat.apache.org/security-4.html
x_refsource_CONFIRM
http://secunia.com/advisories/30908
third-party-advisory
x_refsource_SECUNIA
http://support.apple.com/kb/HT2163
x_refsource_CONFIRM
http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705%40apache.org%3E
mailing-list
x_refsource_MLIST
http://www.securityfocus.com/bid/26070
vdb-entry
x_refsource_BID
http://secunia.com/advisories/27446
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=full-disclosure&m=119239530508382
mailing-list
x_refsource_FULLDISC
http://secunia.com/advisories/30676
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2008-0630.html
vendor-advisory
x_refsource_REDHAT
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
vendor-advisory
x_refsource_SUNALERT
https://exchange.xforce.ibmcloud.com/vulnerabilities/37243
vdb-entry
x_refsource_XF
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202
vdb-entry
signature
x_refsource_OVAL
http://www.redhat.com/support/errata/RHSA-2008-0862.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2008/1981/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/30899
third-party-advisory
x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/31493
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/29242
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2823
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/37460
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1979/references
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/29313
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/31681
vdb-entry
x_refsource_BID
http://secunia.com/advisories/32120
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/3671
vdb-entry
x_refsource_VUPEN
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
x_refsource_CONFIRM
http://secunia.com/advisories/27398
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0042.html
vendor-advisory
x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
vendor-advisory
x_refsource_SUSE
http://www.securitytracker.com/id?1018864
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/28361
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/28317
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
vendor-advisory
x_refsource_APPLE
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/3674
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/507985/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
vendor-advisory
x_refsource_SUSE
http://tomcat.apache.org/security-6.html
x_refsource_CONFIRM
http://secunia.com/advisories/57126
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/32222
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30802
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0195.html
vendor-advisory
x_refsource_REDHAT
http://security.gentoo.org/glsa/glsa-200804-10.xml
vendor-advisory
x_refsource_GENTOO
http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/3622
vdb-entry
x_refsource_VUPEN
http://www-1.ibm.com/support/docview.wss?uid=swg21286112
x_refsource_CONFIRM
http://secunia.com/advisories/27727
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1856/references
vdb-entry
x_refsource_VUPEN
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
x_refsource_CONFIRM
http://tomcat.apache.org/security-5.html
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2780
vdb-entry
x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2008-0261.html
vendor-advisory
x_refsource_REDHAT
https://www.exploit-db.com/exploits/4530
exploit
x_refsource_EXPLOIT-DB
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
vendor-advisory
x_refsource_MANDRIVA
http://www.debian.org/security/2008/dsa-1447
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/27481
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=139344343412337&w=2
vendor-advisory
x_refsource_HP
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
vendor-advisory
x_refsource_APPLE
http://support.apple.com/kb/HT3216
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
vendor-advisory
x_refsource_MANDRIVA
http://secunia.com/advisories/29711
third-party-advisory
x_refsource_SECUNIA
http://issues.apache.org/jira/browse/GERONIMO-3549
x_refsource_MISC
http://www.vupen.com/english/advisories/2009/3316
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/32266
third-party-advisory
x_refsource_SECUNIA
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
Hyperlink: http://www.debian.org/security/2008/dsa-1453
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://tomcat.apache.org/security-4.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30908
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.apple.com/kb/HT2163
Resource:
x_refsource_CONFIRM
Hyperlink: http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705%40apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.securityfocus.com/bid/26070
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/27446
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=full-disclosure&m=119239530508382
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://secunia.com/advisories/30676
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0630.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
Resource:
vendor-advisory
x_refsource_SUNALERT
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/37243
Resource:
vdb-entry
x_refsource_XF
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0862.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2008/1981/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/30899
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/31493
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/29242
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2823
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/37460
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/1979/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/29313
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/31681
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/32120
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/3671
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/27398
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0042.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.securitytracker.com/id?1018864
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/28361
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/28317
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2007/3674
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/507985/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://tomcat.apache.org/security-6.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/57126
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/32222
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30802
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0195.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://security.gentoo.org/glsa/glsa-200804-10.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2007/3622
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21286112
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/27727
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/1856/references
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0010.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://tomcat.apache.org/security-5.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2780
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0261.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://www.exploit-db.com/exploits/4530
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.debian.org/security/2008/dsa-1447
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/27481
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=139344343412337&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://support.apple.com/kb/HT3216
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://secunia.com/advisories/29711
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://issues.apache.org/jira/browse/GERONIMO-3549
Resource:
x_refsource_MISC
Hyperlink: http://www.vupen.com/english/advisories/2009/3316
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/32266
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2008/dsa-1453
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://tomcat.apache.org/security-4.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/30908
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.apple.com/kb/HT2163
x_refsource_CONFIRM
x_transferred
http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705%40apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
http://www.securityfocus.com/bid/26070
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/27446
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=full-disclosure&m=119239530508382
mailing-list
x_refsource_FULLDISC
x_transferred
http://secunia.com/advisories/30676
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2008-0630.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
vendor-advisory
x_refsource_SUNALERT
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/37243
vdb-entry
x_refsource_XF
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0862.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2008/1981/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/30899
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/31493
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/29242
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2823
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/37460
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/1979/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/29313
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/31681
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/32120
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/3671
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/27398
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0042.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.securitytracker.com/id?1018864
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/28361
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/28317
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/3674
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/507985/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://tomcat.apache.org/security-6.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/57126
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/32222
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30802
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0195.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://security.gentoo.org/glsa/glsa-200804-10.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2007/3622
vdb-entry
x_refsource_VUPEN
x_transferred
http://www-1.ibm.com/support/docview.wss?uid=swg21286112
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/27727
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/1856/references
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
x_refsource_CONFIRM
x_transferred
http://tomcat.apache.org/security-5.html
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2780
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0261.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://www.exploit-db.com/exploits/4530
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.debian.org/security/2008/dsa-1447
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/27481
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=139344343412337&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://support.apple.com/kb/HT3216
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://secunia.com/advisories/29711
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://issues.apache.org/jira/browse/GERONIMO-3549
x_refsource_MISC
x_transferred
http://www.vupen.com/english/advisories/2009/3316
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/32266
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1453
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://tomcat.apache.org/security-4.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30908
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.apple.com/kb/HT2163
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705%40apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.securityfocus.com/bid/26070
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/27446
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=full-disclosure&m=119239530508382
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://secunia.com/advisories/30676
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0630.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
Resource:
vendor-advisory
x_refsource_SUNALERT
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/37243
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0862.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1981/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/30899
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/31493
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/29242
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2823
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/37460
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1979/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/29313
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/31681
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/32120
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3671
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/27398
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0042.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.securitytracker.com/id?1018864
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/28361
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/28317
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3674
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/507985/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://tomcat.apache.org/security-6.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/57126
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/32222
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30802
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0195.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200804-10.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/3622
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21286112
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/27727
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/1856/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0010.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://tomcat.apache.org/security-5.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2780
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0261.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/4530
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1447
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/27481
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=139344343412337&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://support.apple.com/kb/HT3216
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://secunia.com/advisories/29711
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://issues.apache.org/jira/browse/GERONIMO-3549
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/3316
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/32266
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:15 Oct, 2007 | 18:17
Updated At:07 Nov, 2023 | 02:01

Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.03.5LOW
AV:N/AC:M/Au:S/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 3.5
Base severity: LOW
Vector:
AV:N/AC:M/Au:S/C:P/I:N/A:N
CPE Matches

The Apache Software Foundation
apache
>>tomcat>>4.0.0
cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.0.1
cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.0.2
cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.0.3
cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.0.4
cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.0.5
cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.0.6
cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.0
cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.1
cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.2
cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.3
cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.4
cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.5
cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.6
cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.7
cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.8
cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.9
cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.10
cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.11
cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.12
cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.13
cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.14
cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.15
cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.16
cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.17
cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.18
cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.19
cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.20
cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.21
cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.22
cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.23
cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.24
cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.25
cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.26
cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.27
cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.28
cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.29
cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.30
cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.31
cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.32
cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.33
cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.34
cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.35
cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>tomcat>>4.1.36
cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
CWE ID: CWE-22
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.htmlsecalert@redhat.com
N/A
http://issues.apache.org/jira/browse/GERONIMO-3549secalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.htmlsecalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.htmlsecalert@redhat.com
N/A
http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705%40apache.org%3Esecalert@redhat.com
N/A
http://marc.info/?l=bugtraq&m=139344343412337&w=2secalert@redhat.com
N/A
http://marc.info/?l=full-disclosure&m=119239530508382secalert@redhat.com
Exploit
http://rhn.redhat.com/errata/RHSA-2008-0630.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/27398secalert@redhat.com
N/A
http://secunia.com/advisories/27446secalert@redhat.com
N/A
http://secunia.com/advisories/27481secalert@redhat.com
N/A
http://secunia.com/advisories/27727secalert@redhat.com
N/A
http://secunia.com/advisories/28317secalert@redhat.com
N/A
http://secunia.com/advisories/28361secalert@redhat.com
N/A
http://secunia.com/advisories/29242secalert@redhat.com
N/A
http://secunia.com/advisories/29313secalert@redhat.com
N/A
http://secunia.com/advisories/29711secalert@redhat.com
N/A
http://secunia.com/advisories/30676secalert@redhat.com
N/A
http://secunia.com/advisories/30802secalert@redhat.com
N/A
http://secunia.com/advisories/30899secalert@redhat.com
N/A
http://secunia.com/advisories/30908secalert@redhat.com
N/A
http://secunia.com/advisories/31493secalert@redhat.com
N/A
http://secunia.com/advisories/32120secalert@redhat.com
N/A
http://secunia.com/advisories/32222secalert@redhat.com
N/A
http://secunia.com/advisories/32266secalert@redhat.com
N/A
http://secunia.com/advisories/37460secalert@redhat.com
N/A
http://secunia.com/advisories/57126secalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200804-10.xmlsecalert@redhat.com
N/A
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1secalert@redhat.com
N/A
http://support.apple.com/kb/HT2163secalert@redhat.com
N/A
http://support.apple.com/kb/HT3216secalert@redhat.com
N/A
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htmsecalert@redhat.com
N/A
http://tomcat.apache.org/security-4.htmlsecalert@redhat.com
N/A
http://tomcat.apache.org/security-5.htmlsecalert@redhat.com
N/A
http://tomcat.apache.org/security-6.htmlsecalert@redhat.com
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg21286112secalert@redhat.com
N/A
http://www.debian.org/security/2008/dsa-1447secalert@redhat.com
N/A
http://www.debian.org/security/2008/dsa-1453secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0042.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0195.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0261.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2008-0862.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/507985/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/26070secalert@redhat.com
N/A
http://www.securityfocus.com/bid/31681secalert@redhat.com
N/A
http://www.securitytracker.com/id?1018864secalert@redhat.com
N/A
http://www.vmware.com/security/advisories/VMSA-2008-0010.htmlsecalert@redhat.com
N/A
http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlsecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/3622secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/3671secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/3674secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/1856/referencessecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/1979/referencessecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/1981/referencessecalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/2780secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2008/2823secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2009/3316secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/37243secalert@redhat.com
N/A
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3Esecalert@redhat.com
N/A
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3Esecalert@redhat.com
N/A
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3Esecalert@redhat.com
N/A
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3Esecalert@redhat.com
N/A
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3Esecalert@redhat.com
N/A
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3Esecalert@redhat.com
N/A
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3Esecalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202secalert@redhat.com
N/A
https://www.exploit-db.com/exploits/4530secalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.htmlsecalert@redhat.com
N/A
Hyperlink: http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://issues.apache.org/jira/browse/GERONIMO-3549
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705%40apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=139344343412337&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=full-disclosure&m=119239530508382
Source: secalert@redhat.com
Resource:
Exploit
Hyperlink: http://rhn.redhat.com/errata/RHSA-2008-0630.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27398
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27446
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27481
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/27727
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28317
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/28361
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/29242
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/29313
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/29711
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30676
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30802
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30899
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/30908
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/31493
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/32120
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/32222
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/32266
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/37460
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/57126
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200804-10.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT2163
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3216
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://tomcat.apache.org/security-4.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://tomcat.apache.org/security-5.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www-1.ibm.com/support/docview.wss?uid=swg21286112
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1447
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1453
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0042.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0195.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0261.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0862.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/26070
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/31681
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1018864
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0010.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/3622
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/3671
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/3674
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1856/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1979/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/1981/references
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2780
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2823
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/3316
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/37243
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9202
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.exploit-db.com/exploits/4530
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

113Records found

CVE-2015-0933
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-3.5||LOW
EPSS-0.42% / 60.89%
||
7 Day CHG~0.00%
Published-04 Mar, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Absolute path traversal vulnerability in ShareLaTeX 0.1.3 and earlier, when the paranoid openin_any setting is omitted, allows remote authenticated users to read arbitrary files via a \include command.

Action-Not Available
Vendor-sharelatexn/a
Product-sharelatexn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-12251
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.2||LOW
EPSS-0.81% / 73.31%
||
7 Day CHG~0.00%
Published-29 Apr, 2020 | 13:02
Updated-04 Aug, 2024 | 11:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an authenticated user to change the filename value (in the POST method) from the original filename to achieve directory traversal via a ../ sequence and, for example, obtain a complete directory listing of the machine.

Action-Not Available
Vendor-gigamonn/a
Product-gigavuen/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-21298
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.5||LOW
EPSS-0.36% / 57.75%
||
7 Day CHG~0.00%
Published-26 Feb, 2021 | 16:25
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path traversal in Node-Red

Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. The issue has been patched in Node-RED 1.2.8. The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor.

Action-Not Available
Vendor-noderednode-red
Product-node-rednode-red
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2013-3993
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-18.64% / 95.02%
||
7 Day CHG~0.00%
Published-07 Jul, 2014 | 10:00
Updated-20 Aug, 2025 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-06-15||The impacted product is end-of-life and should be disconnected if still in use.

IBM InfoSphere BigInsights before 2.1.0.3 allows remote authenticated users to bypass intended file and directory restrictions, or access untrusted data or code, via crafted parameters in unspecified API calls.

Action-Not Available
Vendor-n/aIBM Corporation
Product-infosphere_biginsightsn/aInfoSphere BigInsights
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2013-3004
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.5||LOW
EPSS-0.14% / 34.94%
||
7 Day CHG~0.00%
Published-01 Jul, 2014 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in BIRT-Report Viewer in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.x and 7.2.x before 7.2.1.5 allows remote authenticated users to read arbitrary files via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-tivoli_application_dependency_discovery_managern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-5016
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 27.46%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 15:05
Updated-17 Sep, 2024 | 01:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. When application security is disabled and JAX-RPC applications are present, an attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary xml files on the system. This does not occur if Application security is enabled. IBM X-Force ID: 193556.

Action-Not Available
Vendor-IBM Corporation
Product-websphere_application_serverWebSphere Application Server
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2012-2202
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-3.5||LOW
EPSS-4.56% / 88.77%
||
7 Day CHG~0.00%
Published-27 Jul, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in javatester_init.php in IBM Lotus Protector for Mail Security 2.1, 2.5, 2.5.1, and 2.8 and IBM ISS Proventia Network Mail Security System allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the template parameter.

Action-Not Available
Vendor-n/aIBM Corporation
Product-proventia_network_mail_security_system_firmwareproventia_network_mail_security_systemlotus_protector_for_mail_securityn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-7618
Matching Score-4
Assigner-Elastic
ShareView Details
Matching Score-4
Assigner-Elastic
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 45.20%
||
7 Day CHG~0.00%
Published-01 Oct, 2019 | 17:52
Updated-04 Aug, 2024 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user.

Action-Not Available
Vendor-Elasticsearch BV
Product-kibanaElastic Code
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2012-0991
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.5||LOW
EPSS-70.71% / 98.63%
||
7 Day CHG~0.00%
Published-07 Feb, 2012 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.

Action-Not Available
Vendor-n/aOpenEMR Foundation, Inc
Product-openemrn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-44665
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-5.46% / 89.81%
||
7 Day CHG~0.00%
Published-24 Feb, 2022 | 20:16
Updated-04 Aug, 2024 | 04:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Directory Traversal vulnerability exists in the Xerte Project Xerte through 3.10.3 when downloading a project file via download.php.

Action-Not Available
Vendor-xerten/a
Product-xerten/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-43840
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.23% / 45.85%
||
7 Day CHG~0.00%
Published-17 Dec, 2021 | 18:15
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path traversal in message_bus

message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled.

Action-Not Available
Vendor-Civilized Discourse Construction Kit, Inc.
Product-message_busmessage_bus
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-42022
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-6.5||MEDIUM
EPSS-0.43% / 61.94%
||
7 Day CHG~0.00%
Published-14 Dec, 2021 | 12:06
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC eaSie PCS 7 Skill Package (All versions < V21.00 SP3). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files. The affected file download function is disabled by default.

Action-Not Available
Vendor-Siemens AG
Product-simatic_easie_pcs_7_skillSIMATIC eaSie PCS 7 Skill Package
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2013-6177
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-3.5||LOW
EPSS-0.41% / 60.24%
||
7 Day CHG~0.00%
Published-21 Nov, 2013 | 02:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in EMC Document Sciences xPression 4.1 SP1 before Patch 47, 4.2 before Patch 26, and 4.5 before Patch 05, as used in Documentum Edition, Enterprise Edition Publish Engine, and Enterprise Edition Compuset Engine, allows remote authenticated users to read arbitrary files by leveraging xDashboard access.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-document_sciences_xpressionn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found