// For flags

CVE-2006-3835

Apache Tomcat 5 - Information Disclosure

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.

Apache Tomcat 5 anterior a 5.5.17 permite a atacantes remotos listar directorios a través de un punto y coma (;) precedido de un nombre de archivo con una extensión mapeada, como se demostró con las URLs finalizadas con /;index.jsp y /;help.do.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-07-21 First Exploit
  • 2006-07-24 CVE Reserved
  • 2006-07-25 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (33)
URL Tag Source
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx X_refsource_confirm
http://secunia.com/advisories/25212 Third Party Advisory
http://secunia.com/advisories/30899 Third Party Advisory
http://secunia.com/advisories/30908 Third Party Advisory
http://secunia.com/advisories/33668 Third Party Advisory
http://secunia.com/advisories/37297 Third Party Advisory
http://securitytracker.com/id?1016576 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm X_refsource_confirm
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 X_refsource_confirm
http://tomcat.apache.org/security-4.html X_refsource_confirm
http://tomcat.apache.org/security-5.html X_refsource_confirm
http://www.sec-consult.com/289.html X_refsource_misc
http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt X_refsource_misc
http://www.securityfocus.com/archive/1/468048/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/500396/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/500412/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/507729/100/0/threaded Mailing List
http://www.vupen.com/english/advisories/2007/1727 Vdb Entry
http://www.vupen.com/english/advisories/2008/1979/references Vdb Entry
http://www.vupen.com/english/advisories/2009/0233 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/27902 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/34183 Vdb Entry
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E Mailing List
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.0.28
Search vendor "Apache" for product "Tomcat" and version "5.0.28"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.7
Search vendor "Apache" for product "Tomcat" and version "5.5.7"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.9
Search vendor "Apache" for product "Tomcat" and version "5.5.9"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.12
Search vendor "Apache" for product "Tomcat" and version "5.5.12"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
5.5.16
Search vendor "Apache" for product "Tomcat" and version "5.5.16"
-
Affected