First published: Mon Oct 15 2007(Updated: )
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | =4.0.0 | |
Apache Tomcat | =4.0.1 | |
Apache Tomcat | =4.0.2 | |
Apache Tomcat | =4.0.3 | |
Apache Tomcat | =4.0.4 | |
Apache Tomcat | =4.0.5 | |
Apache Tomcat | =4.0.6 | |
Apache Tomcat | =4.1.0 | |
Apache Tomcat | =4.1.1 | |
Apache Tomcat | =4.1.2 | |
Apache Tomcat | =4.1.3 | |
Apache Tomcat | =4.1.4 | |
Apache Tomcat | =4.1.5 | |
Apache Tomcat | =4.1.6 | |
Apache Tomcat | =4.1.7 | |
Apache Tomcat | =4.1.8 | |
Apache Tomcat | =4.1.9 | |
Apache Tomcat | =4.1.10 | |
Apache Tomcat | =4.1.11 | |
Apache Tomcat | =4.1.12 | |
Apache Tomcat | =4.1.13 | |
Apache Tomcat | =4.1.14 | |
Apache Tomcat | =4.1.15 | |
Apache Tomcat | =4.1.16 | |
Apache Tomcat | =4.1.17 | |
Apache Tomcat | =4.1.18 | |
Apache Tomcat | =4.1.19 | |
Apache Tomcat | =4.1.20 | |
Apache Tomcat | =4.1.21 | |
Apache Tomcat | =4.1.22 | |
Apache Tomcat | =4.1.23 | |
Apache Tomcat | =4.1.24 | |
Apache Tomcat | =4.1.25 | |
Apache Tomcat | =4.1.26 | |
Apache Tomcat | =4.1.27 | |
Apache Tomcat | =4.1.28 | |
Apache Tomcat | =4.1.29 | |
Apache Tomcat | =4.1.30 | |
Apache Tomcat | =4.1.31 | |
Apache Tomcat | =4.1.32 | |
Apache Tomcat | =4.1.33 | |
Apache Tomcat | =4.1.34 | |
Apache Tomcat | =4.1.35 | |
Apache Tomcat | =4.1.36 | |
=4.0.0 | ||
=4.0.1 | ||
=4.0.2 | ||
=4.0.3 | ||
=4.0.4 | ||
=4.0.5 | ||
=4.0.6 | ||
=4.1.0 | ||
=4.1.1 | ||
=4.1.2 | ||
=4.1.3 | ||
=4.1.4 | ||
=4.1.5 | ||
=4.1.6 | ||
=4.1.7 | ||
=4.1.8 | ||
=4.1.9 | ||
=4.1.10 | ||
=4.1.11 | ||
=4.1.12 | ||
=4.1.13 | ||
=4.1.14 | ||
=4.1.15 | ||
=4.1.16 | ||
=4.1.17 | ||
=4.1.18 | ||
=4.1.19 | ||
=4.1.20 | ||
=4.1.21 | ||
=4.1.22 | ||
=4.1.23 | ||
=4.1.24 | ||
=4.1.25 | ||
=4.1.26 | ||
=4.1.27 | ||
=4.1.28 | ||
=4.1.29 | ||
=4.1.30 | ||
=4.1.31 | ||
=4.1.32 | ||
=4.1.33 | ||
=4.1.34 | ||
=4.1.35 | ||
=4.1.36 | ||
maven/org.apache.tomcat:tomcat | >=6.0.0<=6.0.14 | |
maven/org.apache.tomcat:tomcat | >=5.5.0<=5.5.25 | |
maven/org.apache.tomcat:tomcat | =5.0.0 | |
maven/org.apache.tomcat:tomcat | =4.1.0 | |
maven/org.apache.tomcat:tomcat | >=4.0.0<=4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5461 has been rated as a medium severity vulnerability.
To fix CVE-2007-5461, upgrade Apache Tomcat to version 6.0.15 or later.
CVE-2007-5461 affects Apache Tomcat versions 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14.
CVE-2007-5461 can be exploited by remote authenticated users.
An absolute path traversal vulnerability allows an attacker to read arbitrary files from the server by using manipulated input.