First published: Mon Aug 04 2008(Updated: )
Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a `RequestDispatcher` is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a `..` (dot dot) in a request parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=6.0.0<=6.0.16 | 6.0.18 |
maven/org.apache.tomcat:tomcat | >=5.5.0<=5.5.26 | 5.5.27 |
maven/org.apache.tomcat:tomcat | >=4.1.0<=4.1.37 | 4.1.38 |
Tomcat | =4.1.0 | |
Tomcat | =4.1.1 | |
Tomcat | =4.1.2 | |
Tomcat | =4.1.3 | |
Tomcat | =4.1.4 | |
Tomcat | =4.1.5 | |
Tomcat | =4.1.6 | |
Tomcat | =4.1.7 | |
Tomcat | =4.1.8 | |
Tomcat | =4.1.9 | |
Tomcat | =4.1.10 | |
Tomcat | =4.1.11 | |
Tomcat | =4.1.12 | |
Tomcat | =4.1.13 | |
Tomcat | =4.1.14 | |
Tomcat | =4.1.15 | |
Tomcat | =4.1.16 | |
Tomcat | =4.1.17 | |
Tomcat | =4.1.18 | |
Tomcat | =4.1.19 | |
Tomcat | =4.1.20 | |
Tomcat | =4.1.21 | |
Tomcat | =4.1.22 | |
Tomcat | =4.1.23 | |
Tomcat | =4.1.24 | |
Tomcat | =4.1.25 | |
Tomcat | =4.1.26 | |
Tomcat | =4.1.27 | |
Tomcat | =4.1.28 | |
Tomcat | =4.1.29 | |
Tomcat | =4.1.30 | |
Tomcat | =4.1.31 | |
Tomcat | =4.1.32 | |
Tomcat | =4.1.33 | |
Tomcat | =4.1.34 | |
Tomcat | =4.1.35 | |
Tomcat | =4.1.36 | |
Tomcat | =4.1.37 | |
Tomcat | =5.5.0 | |
Tomcat | =5.5.1 | |
Tomcat | =5.5.2 | |
Tomcat | =5.5.3 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.5 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.11 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.13 | |
Tomcat | =5.5.14 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.16 | |
Tomcat | =5.5.17 | |
Tomcat | =5.5.18 | |
Tomcat | =5.5.19 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.21 | |
Tomcat | =5.5.22 | |
Tomcat | =5.5.23 | |
Tomcat | =5.5.24 | |
Tomcat | =5.5.25 | |
Tomcat | =5.5.26 | |
Tomcat | =6.0.0 | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 | |
Tomcat | =6.0.14 | |
Tomcat | =6.0.15 | |
Tomcat | =6.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2370 is considered a critical severity vulnerability, as it enables directory traversal attacks that can lead to unauthorized file access.
To fix CVE-2008-2370, update your Apache Tomcat to versions 4.1.38, 5.5.27, or 6.0.18 or later.
CVE-2008-2370 affects Apache Tomcat versions 4.1.0 to 4.1.37, 5.5.0 to 5.5.26, and 6.0.0 to 6.0.16.
CVE-2008-2370 allows attackers to perform directory traversal attacks, enabling the reading of arbitrary files on the server.
Yes, patches are available through updated versions of Apache Tomcat which can be downloaded from the official repository.