GHSA-m8h8-6rvg-f4mg

Suggest an improvement
Source
https://github.com/advisories/GHSA-m8h8-6rvg-f4mg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-m8h8-6rvg-f4mg/GHSA-m8h8-6rvg-f4mg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m8h8-6rvg-f4mg
Aliases
  • CVE-2008-2370
Published
2022-05-01T23:49:31Z
Modified
2024-02-09T16:42:01.534303Z
Summary
Apache Tomcat Path Traversal Vulnerability
Details

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.

Database specific
{
    "nvd_published_at": "2008-08-04T01:41:00Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-09T16:27:03Z"
}
References

Affected packages

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.0
Fixed
4.1.38

Database specific

{
    "last_known_affected_version_range": "<= 4.1.37"
}

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.5.27

Database specific

{
    "last_known_affected_version_range": "<= 5.5.26"
}

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.0.18

Database specific

{
    "last_known_affected_version_range": "<= 6.0.16"
}