Some weaknesses and a security issue have been reported in Apache Tomcat, which can be exploited by malicious users and malicious people to manipulate certain data, and by malicious people to gain access to potentially sensitive information.
1) In case of a failed undeploy, some autodeployed files may remain with improper access restrictions, potentially leading to e.g. the disclosure of sensitive information.
2) The application does not properly sanitise the file name of WAR files, which can be exploited to e.g. delete files within the host's work directory by deploying WAR files with directory traversal sequences in the file name.
3) The application does not properly sanitise the file names of files contained in a WAR file, which can be exploited to e.g. create arbitrary files outside of the web root via a specially crafted WAR file.
The weaknesses and the security issue are reported in version 6.0.0 to 6.0.20.
Solution: Update to version 6.0.24 or apply patch.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Apache Tomcat WAR Deployment Directory Traversal Weaknesses and Security Issue
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.