Apache Tomcat 路径遍历漏洞

admin 2022-07-23 14:17:03 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

Apache Tomcat 路径遍历漏洞

  • CNNVD编号:CNNVD-200906-265
  • 危害等级: 中危
  • CVE编号: CVE-2008-5515
  • 漏洞类型: 路径遍历
  • 发布时间: 2009-06-16
  • 威胁类型: 远程
  • 更新时间: 2019-04-03
  • 厂        商: apache
  • 漏洞来源: Iida Minehiko

漏洞简介

Apache Tomcat是一个流行的开放源码的jsP应用服务器程序。

Tomcat在使用RequestDispatcher方式过滤查询字符串之前会首先规范化模板路径名称,如果请求中包含有特制参数的话,就可能通过目录遍历攻击访问受限制的内容,或在WEB-INF目录中锁定内容。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

http://svn.apache.org/viewvc?view=rev&revision=782763

http://svn.apache.org/viewvc?view=rev&revision=783292

参考网址

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2010//Mar/msg00001.HTML

来源:HP

链接:http://marc.info/?l=bugtraq&m=127420533226623&w=2

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.HTML

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/1520

来源:CONFIRM

链接:http://www.fujitsu.com/global/support/software/security/products-f/interstage-200902e.HTML

来源:SECUNIA

链接:http://secunia.com/advisories/42368

来源:SECUNIA

链接:http://secunia.com/advisories/35393

来源:DEBIAN

链接:http://www.debian.org/security/2011/dsa-2207

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2010/3056

来源:CONFIRM

链接:http://tomcat.apache.org/security-5.HTML

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/504170/100/0/threaded

来源:MLIST

链接:https://lists.apache.org/thread.HTML/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://www.vmware.com/security/advisories/VMSA-2009-0016.HTML

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.HTML

来源:SECUNIA

链接:http://secunia.com/advisories/35685

来源:SUNALERT

链接:http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.HTML

来源:SECUNIA

链接:http://secunia.com/advisories/35788

来源:BID

链接:http://www.securityfocus.com/bid/35263

来源:JVN

链接:http://jvn.jp/en/jp/JVN63832775/index.HTML

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDVSA-2010:176

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.HTML

来源:HP

链接:http://marc.info/?l=bugtraq&m=136485229118404&w=2

来源:CONFIRM

链接:http://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/kb/HT4077

来源:MLIST

链接:https://lists.apache.org/thread.HTML/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://tomcat.apache.org/security-6.HTML

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDVSA-2009:136

来源:MLIST

链接:https://lists.apache.org/thread.HTML/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDVSA-2009:138

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19452

来源:HP

链接:http://marc.info/?l=bugtraq&m=129070310906557&w=2

来源:FEDORA

链接:https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.HTML

来源:SECUNIA

链接:http://secunia.com/advisories/37460

来源:CONFIRM

链接:http://tomcat.apache.org/security-4.HTML

来源:MLIST

链接:https://lists.apache.org/thread.HTML/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/504202/100/0/threaded

来源:SECUNIA

链接:http://secunia.com/advisories/39317

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/1856

来源:SECUNIA

链接:http://secunia.com/advisories/44183

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/507985/100/0/threaded

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6445

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/1535

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2009/3316

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10422

受影响实体

  • Apache Tomcat:4.1.21  
  • Apache Tomcat:4.1.22  
  • Apache Tomcat:4.1.23  
  • Apache Tomcat:4.1.25  
  • Apache Tomcat:4.1.26  

补丁

    暂无

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0