Products
Solutions
Customers
Partner
Resources
Company
Careers
Community

CVE Reference: CVE-2007-5461

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2007-5461

Description:
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/37243

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
  http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html

SUNALERT
  http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1

ST
  1018864

SAID
  Secunia Advisory: SA31493
  Secunia Advisory: SA32222
  Secunia Advisory: SA32120
  Secunia Advisory: SA32266
  Secunia Advisory: SA30676
  Secunia Advisory: SA30802
  Secunia Advisory: SA30908
  Secunia Advisory: SA30899
  Secunia Advisory: SA28361
  Secunia Advisory: SA29242
  Secunia Advisory: SA29313
  Secunia Advisory: SA29711
  Secunia Advisory: SA27446
  Secunia Advisory: SA27481
  Secunia Advisory: SA27727
  Secunia Advisory: SA28317
  Secunia Advisory: SA57126
  Secunia Advisory: SA27398
  Secunia Advisory: SA37460

REDHAT
  http://www.redhat.com/support/errata/RHSA-2008-0862.html
  http://rhn.redhat.com/errata/RHSA-2008-0630.html
  http://www.redhat.com/support/errata/RHSA-2008-0261.html
  http://www.redhat.com/support/errata/RHSA-2008-0195.html
  http://www.redhat.com/support/errata/RHSA-2008-0042.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9202

MLIST
  http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705@apache.org%3E

MISC
  http://issues.apache.org/jira/browse/GERONIMO-3549

MILW0RM
  http://www.milw0rm.com/exploits/4530

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
  http://www.mandriva.com/security/advisories?name=MDKSA-2007:241

HP
  http://marc.info/?l=bugtraq&m=139344343412337&w=2

GENTOO
  http://security.gentoo.org/glsa/glsa-200804-10.xml

FULLDISC
  http://marc.info/?l=full-disclosure&m=119239530508382

FEDORA

DEBIAN
  http://www.debian.org/security/2008/dsa-1447
  http://www.debian.org/security/2008/dsa-1453

CONFIRM
  http://www.vmware.com/security/advisories/VMSA-2009-0016.html
  http://support.apple.com/kb/HT3216
  http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
  http://support.apple.com/kb/HT2163
  http://www-1.ibm.com/support/docview.wss?uid=swg21286112
  http://www.vmware.com/security/advisories/VMSA-2008-0010.html
  http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html
  http://tomcat.apache.org/security-6.html
  http://tomcat.apache.org/security-5.html
  http://tomcat.apache.org/security-4.html

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded

BID
  31681
  26070

APPLE
  http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
  http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html


Return to the previous page.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability