4.3
CVSSv3

CVE-2015-5174

Published: 25/02/2016 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x prior to 6.0.45, 7.x prior to 7.0.65, and 8.x prior to 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 8.0

debian debian linux 7.0

apache tomcat 7.0.2

apache tomcat 6.0.33

apache tomcat 6.0.0

apache tomcat 6.0.39

apache tomcat 7.0.12

apache tomcat 7.0.62

apache tomcat 8.0.17

apache tomcat 7.0.53

apache tomcat 6.0.4

apache tomcat 7.0.20

apache tomcat 6.0.11

apache tomcat 7.0.34

apache tomcat 8.0.26

apache tomcat 7.0.55

apache tomcat 7.0.4

apache tomcat 7.0.63

apache tomcat 8.0.20

apache tomcat 7.0.22

apache tomcat 7.0.39

apache tomcat 7.0.26

apache tomcat 7.0.28

apache tomcat 8.0.1

apache tomcat 8.0.0

apache tomcat 7.0.59

apache tomcat 6.0.44

apache tomcat 7.0.50

apache tomcat 7.0.6

apache tomcat 6.0.20

apache tomcat 8.0.12

apache tomcat 7.0.14

apache tomcat 6.0.10

apache tomcat 8.0.15

apache tomcat 6.0.29

apache tomcat 7.0.11

apache tomcat 7.0.23

apache tomcat 7.0.0

apache tomcat 6.0.1

apache tomcat 6.0.24

apache tomcat 8.0.22

apache tomcat 6.0.37

apache tomcat 7.0.52

apache tomcat 7.0.42

apache tomcat 6.0.32

apache tomcat 6.0.28

apache tomcat 7.0.37

apache tomcat 7.0.29

apache tomcat 8.0.11

apache tomcat 8.0.24

apache tomcat 8.0.23

apache tomcat 7.0.47

apache tomcat 7.0.5

apache tomcat 8.0.21

apache tomcat 6.0.14

apache tomcat 7.0.41

apache tomcat 7.0.30

apache tomcat 7.0.19

apache tomcat 7.0.16

apache tomcat 6.0.41

apache tomcat 7.0.10

apache tomcat 8.0.18

apache tomcat 7.0.25

apache tomcat 7.0.54

apache tomcat 7.0.35

apache tomcat 7.0.61

apache tomcat 6.0.18

apache tomcat 7.0.57

apache tomcat 6.0.2

apache tomcat 8.0.14

apache tomcat 7.0.32

apache tomcat 6.0.43

apache tomcat 7.0.21

apache tomcat 7.0.27

apache tomcat 7.0.40

apache tomcat 6.0.30

apache tomcat 6.0.13

apache tomcat 7.0.56

apache tomcat 6.0.26

apache tomcat 7.0.64

apache tomcat 6.0.35

apache tomcat 6.0.16

apache tomcat 6.0.36

apache tomcat 7.0.33

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

Vendor Advisories

Several security issues were fixed in Tomcat ...
Synopsis Important: tomcat6 security and bug fix update Type/Severity Security Advisory: Important Topic An update for tomcat6 is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) ...
Synopsis Moderate: Red Hat JBoss Web Server 302 security update Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 302 packages are now available for RedHat Enterprise Linux 6Red Hat Product Security has rated this update as having Moderate securityimpact Common Vulnerabi ...
Synopsis Moderate: Red Hat JBoss Web Server 302 security update Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 302 packages are now available for RedHat Enterprise Linux 7Red Hat Product Security has rated this update as having Moderate securityimpact Common Vulnerabi ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections, bypass of the SecurityManager or denial of service For the stable distribution (jessie), these problems have been fixed in version 8014-1+deb8u2 For the unstable distribution (s ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections and bypass of the SecurityManager For the oldstable distribution (wheezy), these problems have been fixed in version 7028-4+deb7u4 This update also fixes CVE-2014-0119 and CVE-20 ...
A directory traversal flaw was found in Tomcat's RequestUtiljava A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call ...
A directory traversal vulnerability in RequestUtiljava was discovered which allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a / (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call (CVE-2015-5174) The Mapper compo ...
A directory traversal vulnerability in RequestUtiljava was discovered which allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a / (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call (CVE-2015-5174) A session fixati ...
A directory traversal vulnerability in RequestUtiljava was discovered which allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a / (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call (CVE-2015-5174) The Mapper compo ...

References

CWE-22http://svn.apache.org/viewvc?view=revision&revision=1696281http://tomcat.apache.org/security-6.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1700898http://svn.apache.org/viewvc?view=revision&revision=1700900http://tomcat.apache.org/security-8.htmlhttp://seclists.org/bugtraq/2016/Feb/149http://tomcat.apache.org/security-7.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1700897http://svn.apache.org/viewvc?view=revision&revision=1696284http://www.debian.org/security/2016/dsa-3530https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442http://www.debian.org/security/2016/dsa-3609http://www.ubuntu.com/usn/USN-3024-1http://www.debian.org/security/2016/dsa-3552http://rhn.redhat.com/errata/RHSA-2016-1435.htmlhttps://access.redhat.com/errata/RHSA-2016:1433https://access.redhat.com/errata/RHSA-2016:1434https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964http://marc.info/?l=bugtraq&m=145974991225029&w=2http://rhn.redhat.com/errata/RHSA-2016-2045.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlhttp://www.securityfocus.com/bid/83329https://access.redhat.com/errata/RHSA-2016:1432http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.htmlhttps://bto.bluecoat.com/security-advisory/sa118http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.htmlhttp://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.htmlhttp://www.securitytracker.com/id/1035070https://security.gentoo.org/glsa/201705-09http://rhn.redhat.com/errata/RHSA-2016-2599.htmlhttps://security.netapp.com/advisory/ntap-20180531-0001/http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350%40%3Cusers.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2%40%3Cusers.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3Ehttps://usn.ubuntu.com/3024-1/https://nvd.nist.gov