VID |
22468 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The Apache Tomcat server is vulnerable to a directory traversal attack via the UTF-8 encoded characters. Apache Tomcat could allow a remote attacker to view arbitrary files on the affected host. By sending a specially-crafted URL request containing encoded directory traversal sequences as UTF-8, a remote attacker could traverse directories and read arbitrary files on the affected system. Successful exploitation requires that a context is configured with allowLinking="true" and the connector is configured with URIEncoding="UTF-8", neither of which is a default setting.
* References: http://www.securityfocus.com/archive/1/495318/30/0/threaded
* Platforms Affected: Apache Software Foundation, Tomcat 4.1.0 through to 4.1.37 Apache Software Foundation, Tomcat 5.5.0 through to 5.5.26 Apache Software Foundation, Tomcat 6.0.0 through to 6.0.17 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat (4.1.38, 5.5.27, or 6.0.18 or later), available from the Apache Tomcat Web site at http://tomcat.apache.org/ |
Related URL |
CVE-2008-2938 (CVE) |
Related URL |
30633 (SecurityFocus) |
Related URL |
(ISS) |
|