Directory traversal vulnerability in Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (modproxy, modrewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) / (slash), (2) \ (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
{
"nvd_published_at": "2007-03-16T22:19:00Z",
"severity": "MODERATE",
"github_reviewed_at": "2023-09-21T23:07:55Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-22"
]
}