// For flags

CVE-2006-3835

Apache Tomcat 5 - Information Disclosure

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.

Apache Tomcat 5 anterior a 5.5.17 permite a atacantes remotos listar directorios a través de un punto y coma (;) precedido de un nombre de archivo con una extensión mapeada, como se demostró con las URLs finalizadas con /;index.jsp y /;help.do.

ToutVirtual VirtualIQ Pro version 3.2 build 7882 suffers from cross site scripting, cross site request forgery, directory traversal, and code execution vulnerabilities.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-07-21 First Exploit
  • 2006-07-24 CVE Reserved
  • 2006-07-25 CVE Published
  • 2024-06-14 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (33)
URL Tag Source
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx X_refsource_confirm
http://secunia.com/advisories/25212 Third Party Advisory
http://secunia.com/advisories/30899 Third Party Advisory
http://secunia.com/advisories/30908 Third Party Advisory
http://secunia.com/advisories/33668 Third Party Advisory
http://secunia.com/advisories/37297 Third Party Advisory
http://securitytracker.com/id?1016576 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm X_refsource_confirm
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 X_refsource_confirm
http://tomcat.apache.org/security-4.html X_refsource_confirm
http://tomcat.apache.org/security-5.html X_refsource_confirm
http://www.sec-consult.com/289.html X_refsource_misc
http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt X_refsource_misc
http://www.securityfocus.com/archive/1/468048/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/500396/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/500412/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/507729/100/0/threaded Mailing List
http://www.vupen.com/english/advisories/2007/1727 Vdb Entry
http://www.vupen.com/english/advisories/2008/1979/references Vdb Entry
http://www.vupen.com/english/advisories/2009/0233 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/27902 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/34183 Vdb Entry
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E Mailing List
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.0.28
Search vendor "Apache" for product "Tomcat" and version "5.0.28"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.7
Search vendor "Apache" for product "Tomcat" and version "5.5.7"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.9
Search vendor "Apache" for product "Tomcat" and version "5.5.9"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.12
Search vendor "Apache" for product "Tomcat" and version "5.5.12"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.16
Search vendor "Apache" for product "Tomcat" and version "5.5.16"
-
Affected