[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Apache Tomcat v4.1.0 , v4.1.37, v5.5.0 to v5.5.26 vulnerabilities

Author
indoushka
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11095
Category
web applications
Date add
26-02-2010
Platform
unsorted
=================================================================
Apache Tomcat v4.1.0 , v4.1.37, v5.5.0 to v5.5.26 vulnerabilities
=================================================================

Vulnerability description:
An input validation error can be exploited to download arbitrary files via directory traversal attacks. 

Successful exploitation requires that a context is configured with allowLinking="true" and that the connector is configured with URIEncoding="UTF-8". 

Affected versions 4.1.0 to 4.1.37, 5.5.0 to 5.5.26.
Affected items
test : http://127.0.0.1:7021/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd
The impact of this vulnerability
The remote atacker can download arbitrary files via directory traversal attacks.

How to fix this vulnerability
The problem was fixed in the SVN.





#  0day.today [2024-11-16]  #