Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1447-1 | New tomcat5.5 packages fix several vulnerabilities |
Debian DSA |
DSA-1453-1 | New tomcat5 packages fix several vulnerabilities |
EUVD |
EUVD-2022-5288 | Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag. |
Github GHSA |
GHSA-v5p2-vg3c-pmrr | Apache Tomcat Path Traversal Vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T15:31:58.669Z
Reserved: 2007-10-15T00:00:00
Link: CVE-2007-5461
No data.
Status : Deferred
Published: 2007-10-15T18:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-5461
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA