GHSA-4prh-gqw8-rgh5

Suggest an improvement
Source
https://github.com/advisories/GHSA-4prh-gqw8-rgh5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4prh-gqw8-rgh5/GHSA-4prh-gqw8-rgh5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4prh-gqw8-rgh5
Aliases
  • CVE-2007-0450
Published
2022-05-01T17:44:16Z
Modified
2023-11-08T03:56:47.458195Z
Summary
Apache Tomcat Directory Traversal
Details

Directory traversal vulnerability in Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (modproxy, modrewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) / (slash), (2) \ (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

Database specific
{
    "nvd_published_at": "2007-03-16T22:19:00Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-09-21T23:07:55Z"
}
References

Affected packages

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0
Fixed
5.5.22

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0
Fixed
6.0.10