CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
98.9%
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | tomcat | 7.0.39 | cpe:/a:apache:tomcat:7.0.39::: |
apache | tomcat | 7.0.14 | cpe:/a:apache:tomcat:7.0.14::: |
apache | tomcat | 7.0.26 | cpe:/a:apache:tomcat:7.0.26::: |
apache | tomcat | 7.0.23 | cpe:/a:apache:tomcat:7.0.23::: |
apache | tomcat | 7.0.34 | cpe:/a:apache:tomcat:7.0.34::: |
apache | tomcat | 7.0.17 | cpe:/a:apache:tomcat:7.0.17::: |
apache | tomcat | 7.0.25 | cpe:/a:apache:tomcat:7.0.25::: |
apache | tomcat | 7.0.36 | cpe:/a:apache:tomcat:7.0.36::: |
apache | tomcat | 7.0.13 | cpe:/a:apache:tomcat:7.0.13::: |
apache | tomcat | 7.0.56 | cpe:/a:apache:tomcat:7.0.56::: |
[
{
"product": "Apache Tomcat",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "7.0.0 to 7.0.80"
}
]
}
]
www.securityfocus.com/bid/100897
www.securitytracker.com/id/1039393
access.redhat.com/errata/RHSA-2018:0465
access.redhat.com/errata/RHSA-2018:0466
lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6%40%3Cannounce.tomcat.apache.org%3E
lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
lists.debian.org/debian-lts-announce/2018/06/msg00008.html
security.netapp.com/advisory/ntap-20171018-0001/
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
usn.ubuntu.com/3665-1/
www.synology.com/support/security/Synology_SA_17_54_Tomcat
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
98.9%