Korean
<< Back
VID 22468
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache Tomcat server is vulnerable to a directory traversal attack via the UTF-8 encoded characters. Apache Tomcat could allow a remote attacker to view arbitrary files on the affected host. By sending a specially-crafted URL request containing encoded directory traversal sequences as UTF-8, a remote attacker could traverse directories and read arbitrary files on the affected system.
Successful exploitation requires that a context is configured with allowLinking="true" and the connector is configured with URIEncoding="UTF-8", neither of which is a default setting.

* References:
http://www.securityfocus.com/archive/1/495318/30/0/threaded

* Platforms Affected:
Apache Software Foundation, Tomcat 4.1.0 through to 4.1.37
Apache Software Foundation, Tomcat 5.5.0 through to 5.5.26
Apache Software Foundation, Tomcat 6.0.0 through to 6.0.17
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat (4.1.38, 5.5.27, or 6.0.18 or later), available from the Apache Tomcat Web site at http://tomcat.apache.org/
Related URL CVE-2008-2938 (CVE)
Related URL 30633 (SecurityFocus)
Related URL (ISS)