Vulnerability Name: | CVE-2007-0450 (CCN-32988) | ||||||||||||||||||||
Assigned: | 2007-03-14 | ||||||||||||||||||||
Published: | 2007-03-14 | ||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||
Summary: | Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache. | ||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Wed Mar 14 2007 - 08:19:59 CDT SEC Consult SA-20070314-0 :: Apache HTTP Server / Tomcat directory traversal Source: secalert@redhat.com Type: Broken Link secalert@redhat.com Source: CCN Type: CA Security Response Blog, Jan 23 2009, 06:04 PM CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities Source: MITRE Type: CNA CVE-2007-0450 Source: CCN Type: Apple Security Update 2007-007 About Security Update 2007-007 Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: Apple Web site Apple security updates Source: CCN Type: HP Security Bulletin HPSBUX02262 SSRT071447 HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS) Source: secalert@redhat.com Type: Broken Link secalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: CCN Type: Security-announce Mailing List, Mon Jan 7 17:56:48 PST 2008 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1 Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: RHSA-2007-0326 Important: tomcat security update Source: CCN Type: RHSA-2007-0327 Important: tomcat security update Source: CCN Type: RHSA-2007-0328 Important: tomcat security update Source: CCN Type: RHSA-2007-0340 Important: tomcat security update Source: CCN Type: RHSA-2007-0360 Important: jbossas security update Source: CCN Type: RHSA-2007-1069 Moderate: tomcat security update for Red Hat Network Satellite Server Source: CCN Type: RHSA-2008-0261 Moderate: Red Hat Network Satellite Server security update Source: CCN Type: RHSA-2008-0524 Low: Red Hat Network Satellite Server security update Source: CCN Type: RHSA-2010-0602 Moderate: Red Hat Certificate System 7.3 security update Source: CCN Type: SA24732 Apache Tomcat Directory Traversal Security Issue Source: CCN Type: SA26235 Mac OS X Security Update Fixes Multiple Vulnerabilities Source: CCN Type: SA26660 Interstage Application Server Multiple Vulnerabilities Source: CCN Type: SA28365 VMware ESX Server and VirtualCenter Multiple Security Updates Source: CCN Type: SA30899 Sun Solaris 9 Tomcat Multiple Vulnerabilities Source: CCN Type: SA30908 Sun Solaris 10 Tomcat Multiple Vulnerabilities Source: CCN Type: SA33668 CA Cohesion Application Configuration Manager Apache Tomcat Multiple Vulnerabilities Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Broken Link secalert@redhat.com Source: CCN Type: Sun Alert ID: 239312 Security Vulnerabilities in Tomcat 4.0 Shipped with Solaris 9 and 10 Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: ASA-2007-206 tomcat security update (RHSA-2007-0326) Source: CCN Type: ASA-2007-208 JBossAS security update (RHSA-2007-0360) Source: CCN Type: ASA-2007-265 tomcat security update (RHSA-2007-0328) Source: CCN Type: ASA-2007-416 HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS) (HPSBUX02262) Source: CCN Type: ASA-2008-293 Security Vulnerabilities in Tomcat 4.0 Shipped with Solaris 9 and 10 (Sun 239312) Source: secalert@redhat.com Type: Broken Link, Third Party Advisory secalert@redhat.com Source: CCN Type: Apache Tomcat Web site Apache Tomcat - Apache Tomcat Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: FUJITSU Web site Directory traversal vulnerabilities in Interstage Application Server(CVE-2007-0450). September 6th, 2007 Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: GLSA-200705-03 Tomcat: Information disclosure Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Broken Link secalert@redhat.com Source: secalert@redhat.com Type: Broken Link secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Broken Link secalert@redhat.com Source: secalert@redhat.com Type: Broken Link secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: CCN Type: BID-22960 Apache HTTP Server Tomcat Directory Traversal Vulnerability Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: CCN Type: BID-25159 Apple Mac OS X 2007-007 Multiple Security Vulnerabilities Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: VDB Entry, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN tomcat-proxy-directory-traversal(32988) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: CA20090123-01 Security Notice for Cohesion Tomcat Source: SUSE Type: SUSE-SR:2007:005 SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2007:015 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |