Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.

Project Subscriptions

Vendors Products
Certificate System Subscribe
Enterprise Linux Subscribe
Jboss Enterprise Application Platform Subscribe
Network Satellite Subscribe
Rhel Application Server Subscribe
Rhel Developer Suite Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-m8h8-6rvg-f4mg Apache Tomcat Path Traversal Vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=123376588623823&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=139344343412337&w=2 cve-icon cve-icon
http://secunia.com/advisories/31379 cve-icon cve-icon
http://secunia.com/advisories/31381 cve-icon cve-icon
http://secunia.com/advisories/31639 cve-icon cve-icon
http://secunia.com/advisories/31865 cve-icon cve-icon
http://secunia.com/advisories/31891 cve-icon cve-icon
http://secunia.com/advisories/31982 cve-icon cve-icon
http://secunia.com/advisories/32120 cve-icon cve-icon
http://secunia.com/advisories/32222 cve-icon cve-icon
http://secunia.com/advisories/32266 cve-icon cve-icon
http://secunia.com/advisories/33797 cve-icon cve-icon
http://secunia.com/advisories/33999 cve-icon cve-icon
http://secunia.com/advisories/34013 cve-icon cve-icon
http://secunia.com/advisories/35393 cve-icon cve-icon
http://secunia.com/advisories/36249 cve-icon cve-icon
http://secunia.com/advisories/37460 cve-icon cve-icon
http://secunia.com/advisories/57126 cve-icon cve-icon
http://securityreason.com/securityalert/4099 cve-icon cve-icon
http://support.apple.com/kb/HT3216 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm cve-icon cve-icon
http://tomcat.apache.org/security-4.html cve-icon cve-icon
http://tomcat.apache.org/security-5.html cve-icon cve-icon
http://tomcat.apache.org/security-6.html cve-icon cve-icon
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.html cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:188 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0648.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0862.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0864.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/495022/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/507985/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/30494 cve-icon cve-icon
http://www.securityfocus.com/bid/31681 cve-icon cve-icon
http://www.securitytracker.com/id?1020623 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2009-0002.html cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2009-0016.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2305 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2780 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2823 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/0320 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/0503 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1535 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/2215 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/3316 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/44156 cve-icon cve-icon
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-2370 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10577 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5876 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-2370 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T08:58:02.533Z

Reserved: 2008-05-21T00:00:00

Link: CVE-2008-2370

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2008-08-04T01:41:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2008-2370

cve-icon Redhat

Severity : Important

Publid Date: 2008-08-01T00:00:00Z

Links: CVE-2008-2370 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses