Directory Traversal in Apache Tomcat
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Feb 21, 2024
Package
Affected versions
>= 4.1.0, < 4.1.40
>= 5.5.0, < 5.5.28
>= 6.0.0, < 6.0.20
Patched versions
4.1.40
5.5.28
6.0.20
Description
Published by the National Vulnerability Database
Jun 16, 2009
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jun 9, 2022
Last updated
Feb 21, 2024
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
References