Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Package
Affected versions
>= 8.0.0.RC1, <= 8.0.26
>= 7.0.0, <= 7.0.64
>= 6.0.0, <= 6.0.44
Patched versions
8.0.27
7.0.65
6.0.45
Description
Published by the National Vulnerability Database
Feb 25, 2016
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jul 6, 2022
Last updated
Jan 27, 2023
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
References