// For flags

CVE-2008-2938

Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal (PoC)

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.

Una vulnerabilidad de salto de directorio (Directory Traversal) en Apache Tomcat versión 4.1.0 hasta 4.1.37, versión 5.5.0 hasta 5.5.26 y versión 6.0.0 hasta 6.0.16, cuando están habilitados allowLinking y UTF-8, permite a atacantes remotos leer archivos arbitrarios por medio de secuencias de salto de directorio (Directory Traversal) en el URI, una vulnerabilidad diferente a CVE-2008-2370. NOTA: las versiones anteriores a 6.0.18 se informaron afectadas, pero el aviso del proveedor enumera 6.0.16 como la última versión afectada.

ToutVirtual VirtualIQ Pro version 3.2 build 7882 suffers from cross site scripting, cross site request forgery, directory traversal, and code execution vulnerabilities.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-06-30 CVE Reserved
  • 2008-08-13 CVE Published
  • 2010-07-28 First Exploit
  • 2024-08-07 CVE Updated
  • 2024-08-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (46)
URL Tag Source
http://secunia.com/advisories/31639 Broken Link
http://secunia.com/advisories/31865 Broken Link
http://secunia.com/advisories/31891 Broken Link
http://secunia.com/advisories/31982 Broken Link
http://secunia.com/advisories/32120 Broken Link
http://secunia.com/advisories/32222 Broken Link
http://secunia.com/advisories/32266 Broken Link
http://secunia.com/advisories/33797 Broken Link
http://secunia.com/advisories/37297 Broken Link
http://securityreason.com/securityalert/4148 Third Party Advisory
http://support.apple.com/kb/HT3216 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm Third Party Advisory
http://www.kb.cert.org/vuls/id/343355 Third Party Advisory
http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt Third Party Advisory
http://www.securityfocus.com/archive/1/495318/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/507729/100/0/threaded Mailing List
http://www.securityfocus.com/bid/30633 Third Party Advisory
http://www.securityfocus.com/bid/31681 Third Party Advisory
http://www.securitytracker.com/id?1020665 Third Party Advisory
http://www.vupen.com/english/advisories/2008/2343 Third Party Advisory
http://www.vupen.com/english/advisories/2008/2780 Third Party Advisory
http://www.vupen.com/english/advisories/2008/2823 Third Party Advisory
http://www.vupen.com/english/advisories/2009/0320 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/44411 Third Party Advisory
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10587 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 4.0.0 <= 4.1.37
Search vendor "Apache" for product "Tomcat" and version " >= 4.0.0 <= 4.1.37"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 5.0.0 <= 5.5.26
Search vendor "Apache" for product "Tomcat" and version " >= 5.0.0 <= 5.5.26"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
>= 6.0.0 <= 6.0.16
Search vendor "Apache" for product "Tomcat" and version " >= 6.0.0 <= 6.0.16"
-
Affected