Lucene search

K
f5F5F5:K9110
HistoryMar 25, 2013 - 12:00 a.m.

K9110 : Apache Tomcat information disclosure vulnerability - CVE-2008-2370

2013-03-2500:00:00
my.f5.com
18

7.4 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.011 Low

EPSS

Percentile

83.2%

Security Advisory Description

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to K4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM 9.3.0 - 9.3.1
9.4.0 - 9.4.8
9.6.0 - 9.6.1
10.0.0 - 10.0.1 10.1.x
10.2.x
11.x
BIG-IP GTM 9.3.0 - 9.3.1
9.4.0 - 9.4.8
10.0.0 - 10.0.1 10.1.x
10.2.x
11.x
BIG-IP ASM 9.3.0 - 9.3.1
9.4.0 - 9.4.8
10.0.0 - 10.0.1 10.1.x
10.2.x
11.x
BIG-IP Link Controller 9.3.0 - 9.3.1
9.4.0 - 9.4.8
10.0.0 - 10.0.1 10.1.x
10.2.x
11.x
BIG-IP WebAccelerator 9.4.0 - 9.4.8
10.0.0 - 10.0.1 10.1.x
10.2.x
11.x
BIG-IP PSM 9.4.5 - 9.4.8
10.0.0 - 10.0.1 10.1.x
10.2.x
11.x
BIG-IP WAN Optimization 10.0.0 - 10.0.1 10.1.x
10.2.x
11.x
BIG-IP APM None 10.1.x
10.2.x
11.x
BIG-IP Edge Gateway None 10.1.x
10.2.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM None 11.x
FirePass None 5.x
6.x
7.x
Enterprise Manager 1.2.0 - 1.4.1
1.6.0 - 1.8.0 2.x
3.x
ARX 2.7.0 - 2.7.1
3.2.1 - 3.2.3
4.0.1 - 4.1.3
5.0.0 - 5.1.7 5.2.0 - 5.3.1
6.x

Vulnerability description and product information

Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files through a … (dot dot) in a request parameter.

Note: This issue is considered to be a local vulnerability with low risk, as execution would require the user to already be logged in to the Configuration utility for the BIG-IP LTM, GTM, ASM, PSM, Link Controller, WebAccelerator, and Enterprise Manager products.

Information about this advisory is available at the following location:

Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.

<https://vulners.com/cve/CVE-2008-2370&gt;

F5 Product Development tracked this issue as CR104935 and it was fixed in BIG-IP 10.1.0 and Enterprise Manager 2.0.0. For information about upgrading, refer to the BIG-IP LTM, GTM, ASM, PSM, Link Controller, WebAccelerator, or Enterprise Manager release notes.

F5 Product Development tracked this issue as ID 31455 for ARX and it was fixed in ARX 5.2.0. For information about upgrading, refer to the ARX release notes.

7.4 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.011 Low

EPSS

Percentile

83.2%