CVE-2008-2938
Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal (PoC)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
9Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
Una vulnerabilidad de salto de directorio (Directory Traversal) en Apache Tomcat versión 4.1.0 hasta 4.1.37, versión 5.5.0 hasta 5.5.26 y versión 6.0.0 hasta 6.0.16, cuando están habilitados allowLinking y UTF-8, permite a atacantes remotos leer archivos arbitrarios por medio de secuencias de salto de directorio (Directory Traversal) en el URI, una vulnerabilidad diferente a CVE-2008-2370. NOTA: las versiones anteriores a 6.0.18 se informaron afectadas, pero el aviso del proveedor enumera 6.0.16 como la última versión afectada.
A number of vulnerabilities have been discovered in the Apache Tomcat server. The default catalina.policy in the JULI logging component did not restrict certain permissions for web applications which could allow a remote attacker to modify logging configuration options and overwrite arbitrary files. A cross-site scripting vulnerability was found in the HttpServletResponse.sendError() method which could allow a remote attacker to inject arbitrary web script or HTML via forged HTTP headers. A cross-site scripting vulnerability was found in the host manager application that could allow a remote attacker to inject arbitrary web script or HTML via the hostname parameter. A traversal vulnerability was found when using a RequestDispatcher in combination with a servlet or JSP that could allow a remote attacker to utilize a specially-crafted request parameter to access protected web resources. A traversal vulnerability was found when the 'allowLinking' and 'URIencoding' settings were actived which could allow a remote attacker to use a UTF-8-encoded request to extend their privileges and obtain local files accessible to the Tomcat process. The updated packages have been patched to correct these issues.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-06-30 CVE Reserved
- 2008-08-13 CVE Published
- 2008-08-13 First Exploit
- 2024-08-07 CVE Updated
- 2025-06-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (55)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/180872 | 2024-08-31 | |
https://packetstorm.news/files/id/180868 | 2024-08-31 | |
https://packetstorm.news/files/id/69010 | 2008-08-13 | |
https://packetstorm.news/files/id/74165 | 2009-01-21 | |
https://packetstorm.news/files/id/82649 | 2009-11-17 | |
https://packetstorm.news/files/id/92240 | 2010-07-28 | |
https://www.exploit-db.com/exploits/6229 | 2024-08-07 | |
https://www.exploit-db.com/exploits/14489 | 2010-07-28 | |
https://github.com/Naramsim/Offensive | 2018-09-01 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Tomcat Search vendor "Apache" for product "Tomcat" | >= 4.0.0 <= 4.1.37 Search vendor "Apache" for product "Tomcat" and version " >= 4.0.0 <= 4.1.37" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Tomcat Search vendor "Apache" for product "Tomcat" | >= 5.0.0 <= 5.5.26 Search vendor "Apache" for product "Tomcat" and version " >= 5.0.0 <= 5.5.26" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Tomcat Search vendor "Apache" for product "Tomcat" | >= 6.0.0 <= 6.0.16 Search vendor "Apache" for product "Tomcat" and version " >= 6.0.0 <= 6.0.16" | - |
Affected
|