Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:11887
HistoryJan 15, 2019 - 9:09 a.m.

Directory Traversal

2019-01-1509:09:27
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
4

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

Tomcat is vulnerable to directory traversal. The methods getResource(), getResourceAsStream(), and getResourcePaths() in ServletContext do not correctly validate that the paths given to them do not contain “/…”. However the impact of the directory traversal is limited as “/…/” is rejected. This allows malicious web applications to expose the directory listings for $CATALINA_BASE/webapps

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N