Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2207-1 | tomcat5.5 security update |
Github GHSA |
GHSA-9737-qmgc-hfr9 | Directory Traversal in Apache Tomcat |
Ubuntu USN |
USN-788-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T10:56:46.803Z
Reserved: 2008-12-12T00:00:00
Link: CVE-2008-5515
No data.
Status : Deferred
Published: 2009-06-16T21:00:00.313
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-5515
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA
Ubuntu USN