Directory traversal vulnerability in Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (modproxy, modrewrite, mod_jk), allows remote attackers to read arbitrary files via a ..
(dot dot) sequence with combinations of (1) /
(slash), (2) \
(backslash), and (3) URL-encoded backslash (%5C
) characters in the URL, which are valid separators in Tomcat but not in Apache.
{ "nvd_published_at": "2007-03-16T22:19:00Z", "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-09-21T23:07:55Z" }