5
CVSSv2

CVE-2008-5515

Published: 16/06/2009 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apache Tomcat 4.1.0 up to and including 4.1.39, 5.5.0 up to and including 5.5.27, 6.0.0 up to and including 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote malicious users to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 5.5.27

apache tomcat 4.1.2

apache tomcat 4.1.35

apache tomcat 4.1.36

apache tomcat 5.5.18

apache tomcat 4.1.21

apache tomcat 6.0.6

apache tomcat 5.5.12

apache tomcat 5.5.14

apache tomcat 4.1.24

apache tomcat 5.5.10

apache tomcat 5.5.4

apache tomcat 5.5.7

apache tomcat 5.5.1

apache tomcat 6.0.7

apache tomcat 5.5.11

apache tomcat 4.1.25

apache tomcat 6.0.4

apache tomcat 5.5.6

apache tomcat 5.5.26

apache tomcat 4.1.39

apache tomcat 5.5.20

apache tomcat 5.5.15

apache tomcat 5.5.5

apache tomcat 4.1.27

apache tomcat 6.0.15

apache tomcat 4.1.30

apache tomcat 4.1.38

apache tomcat 4.1.11

apache tomcat 5.5.21

apache tomcat 4.1.18

apache tomcat 5.5.22

apache tomcat 4.1.14

apache tomcat 6.0.10

apache tomcat 6.0.3

apache tomcat 4.1.19

apache tomcat 6.0.9

apache tomcat 4.1.31

apache tomcat 5.5.3

apache tomcat 4.1.16

apache tomcat 4.1.29

apache tomcat 6.0.17

apache tomcat 4.1.22

apache tomcat 6.0

apache tomcat 4.1.26

apache tomcat 4.1.13

apache tomcat 5.5.9

apache tomcat 5.5.25

apache tomcat 6.0.0

apache tomcat 4.1.17

apache tomcat 6.0.14

apache tomcat 5.5.2

apache tomcat 4.1.33

apache tomcat 5.5.0

apache tomcat 4.1.1

apache tomcat 5.5.13

apache tomcat 6.0.1

apache tomcat 6.0.12

apache tomcat 5.5.24

apache tomcat 4.1.12

apache tomcat 4.1.28

apache tomcat 6.0.18

apache tomcat 4.1.15

apache tomcat 4.1.10

apache tomcat 5.5.8

apache tomcat 5.5.16

apache tomcat 4.1.0

apache tomcat 6.0.5

apache tomcat 4.1.20

apache tomcat 5.5.17

apache tomcat 4.1.3

apache tomcat 5.5.19

apache tomcat 4.1.23

apache tomcat 4.1.34

apache tomcat 4.1.32

apache tomcat 4.1.37

apache tomcat 6.0.2

apache tomcat 6.0.13

apache tomcat 5.5.23

apache tomcat 6.0.16

Vendor Advisories

Synopsis Important: tomcat security update Type/Severity Security Advisory: Important Topic Updated tomcat packages that fix several security issues are now availablefor Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team D ...
Synopsis Important: JBoss Enterprise Application Platform 430CP05 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Application Platform (JBEAP) 43 packages that fixvarious issues are now available for Red Hat Enterprise Linux 5 as JBEAP430CP05This update has been rate ...
Iida Minehiko discovered that Tomcat did not properly normalise paths A remote attacker could send specially crafted requests to the server and bypass security restrictions, gaining access to sensitive content (CVE-2008-5515) ...
Debian Bug report logs - #532363 CVE-2009-0033 CVE-2009-0580 CVE-2009-0783 CVE-2009-0781: Apache Tomcat 5 Multiple Vulnerabilities Package: tomcat5; Maintainer for tomcat5 is (unknown); Reported by: Giuseppe Iuculano <giuseppe@iuculanoit> Date: Mon, 8 Jun 2009 20:39:02 UTC Severity: serious Tags: patch, security Found i ...
Debian Bug report logs - #532362 CVE-2009-0033 CVE-2009-0580 CVE-2009-0783 CVE-2009-0781: Apache Tomcat 6 Multiple Vulnerabilities Package: tomcat6; Maintainer for tomcat6 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Giuseppe Iuculano <giuseppe@iuculanoit> Date: Mon, 8 Jun ...

Exploits

When using a RequestDispatcher obtained from the Request in Apache Tomcat, the target path was normalized before the query string was removed A request that included a specially crafted request parameter could be used to access content that would otherwise be protected by a security constraint or by locating it in under the WEB-INF directory Vers ...

References

CWE-22http://www.vupen.com/english/advisories/2009/1520http://www.securityfocus.com/bid/35263http://tomcat.apache.org/security-5.htmlhttp://tomcat.apache.org/security-4.htmlhttp://jvn.jp/en/jp/JVN63832775/index.htmlhttp://tomcat.apache.org/security-6.htmlhttp://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.htmlhttp://secunia.com/advisories/35393http://www.vupen.com/english/advisories/2009/1535http://www.mandriva.com/security/advisories?name=MDVSA-2009:138http://www.mandriva.com/security/advisories?name=MDVSA-2009:136http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.htmlhttp://secunia.com/advisories/35685http://www.vupen.com/english/advisories/2009/1856http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1http://secunia.com/advisories/35788http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlhttp://secunia.com/advisories/37460https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.htmlhttp://www.vupen.com/english/advisories/2009/3316http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlhttp://support.apple.com/kb/HT4077http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.htmlhttp://secunia.com/advisories/39317http://www.mandriva.com/security/advisories?name=MDVSA-2010:176http://marc.info/?l=bugtraq&m=129070310906557&w=2http://www.vupen.com/english/advisories/2010/3056http://secunia.com/advisories/42368http://secunia.com/advisories/44183http://www.debian.org/security/2011/dsa-2207http://marc.info/?l=bugtraq&m=136485229118404&w=2http://marc.info/?l=bugtraq&m=127420533226623&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6445https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19452https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10422http://www.securityfocus.com/archive/1/507985/100/0/threadedhttp://www.securityfocus.com/archive/1/504202/100/0/threadedhttp://www.securityfocus.com/archive/1/504170/100/0/threadedhttps://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2009:1164https://usn.ubuntu.com/788-1/https://nvd.nist.gov