4.3

CVE-2008-2938

Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.

Data is provided by the National Vulnerability Database (NVD)
ApacheTomcat Version >= 4.0.0 <= 4.1.37
ApacheTomcat Version >= 5.0.0 <= 5.5.26
ApacheTomcat Version >= 6.0.0 <= 6.0.16
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 92.26% 0.997
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

http://www.securityfocus.com/bid/31681
Third Party Advisory
VDB Entry
http://www.kb.cert.org/vuls/id/343355
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/30633
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020665
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6229
Third Party Advisory
VDB Entry