Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.108476
Category:Web Servers
Title:Apache Tomcat 'UTF-8' Directory Traversal Vulnerability - Active Check
Summary:Apache Tomcat is prone to a directory traversal vulnerability; because it fails to sufficiently sanitize user-supplied input.
Description:Summary:
Apache Tomcat is prone to a directory traversal vulnerability
because it fails to sufficiently sanitize user-supplied input.

Vulnerability Insight:
Originally reported as a Tomcat vulnerability the root cause of
this issue is that the JVM does not correctly decode UTF-8 encoded URLs to UTF-8. This exposes a
directory traversal vulnerability when the connector uses URIEncoding='UTF-8'. This directory
traversal is limited to the docBase of the web application.

If a context is configured with allowLinking='true' then the directory traversal vulnerability is
extended to the entire file system of the host server.

It should also be noted that setting useBodyEncodingForURI='true' has the same effect as setting
URIEncoding='UTF-8' when processing requests with bodies encoded with UTF-8.

Although the root cause was quickly identified as a JVM issue and that it affected multiple JVMs
from multiple vendors, it was decided to report this as a Tomcat vulnerability until such time as
the JVM vendors provided updates to resolve this issue. For further information on the status of
this issue for your JVM, contact your JVM vendor.

Vulnerability Impact:
A remote attacker could exploit this vulnerability using
directory-traversal strings (such as '../') to gain access to arbitrary files on the targeted
system. This may result in the disclosure of sensitive information or lead to a complete
compromise of the affected computer.

Affected Software/OS:
Apache Tomcat versions before 4.1.39, 5.x before 5.5.27 and 6.x
before 6.0.18 are vulnerable.

Solution:
Update Apache Tomcat to version 4.1.39, 5.5.27 or 6.0.18 or
later which includes a workaround that protects against this and any similar character encoding
issues that may still exist in the JVM.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-2938
1020665
http://www.securitytracker.com/id?1020665
20080811 Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability
http://www.securityfocus.com/archive/1/495318/100/0/threaded
20091107 ToutVirtual VirtualIQ Multiple Vulnerabilities
http://www.securityfocus.com/archive/1/507729/100/0/threaded
30633
http://www.securityfocus.com/bid/30633
31639
http://secunia.com/advisories/31639
31681
http://www.securityfocus.com/bid/31681
31865
http://secunia.com/advisories/31865
31891
http://secunia.com/advisories/31891
31982
http://secunia.com/advisories/31982
32120
http://secunia.com/advisories/32120
32222
http://secunia.com/advisories/32222
32266
http://secunia.com/advisories/32266
33797
http://secunia.com/advisories/33797
37297
http://secunia.com/advisories/37297
4148
http://securityreason.com/securityalert/4148
6229
https://www.exploit-db.com/exploits/6229
ADV-2008-2343
http://www.vupen.com/english/advisories/2008/2343
ADV-2008-2780
http://www.vupen.com/english/advisories/2008/2780
ADV-2008-2823
http://www.vupen.com/english/advisories/2008/2823
ADV-2009-0320
http://www.vupen.com/english/advisories/2009/0320
APPLE-SA-2008-10-09
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
FEDORA-2008-7977
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00712.html
FEDORA-2008-8113
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00859.html
FEDORA-2008-8130
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00889.html
HPSBUX02401
http://marc.info/?l=bugtraq&m=123376588623823&w=2
MDVSA-2008:188
http://www.mandriva.com/security/advisories?name=MDVSA-2008:188
RHSA-2008:0648
http://www.redhat.com/support/errata/RHSA-2008-0648.html
RHSA-2008:0862
http://www.redhat.com/support/errata/RHSA-2008-0862.html
RHSA-2008:0864
http://www.redhat.com/support/errata/RHSA-2008-0864.html
SSRT090005
SUSE-SR:2008:018
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
SUSE-SR:2009:004
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
VU#343355
http://www.kb.cert.org/vuls/id/343355
[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
http://support.apple.com/kb/HT3216
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
http://tomcat.apache.org/security-4.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt
oval:org.mitre.oval:def:10587
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10587
tomcat-allowlinking-utf8-directory-traversal(44411)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44411
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.