First published: Wed Aug 13 2008(Updated: )
Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=6.0.0<=6.0.16 | 6.0.18 |
maven/org.apache.tomcat:tomcat | >=5.5.0<=5.5.26 | 5.5.27 |
maven/org.apache.tomcat:tomcat | >=4.1.0<=4.1.37 | 4.1.39 |
Tomcat | >=4.0.0<=4.1.37 | |
Tomcat | >=5.0.0<=5.5.26 | |
Tomcat | >=6.0.0<=6.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2938 is classified as a critical severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To mitigate CVE-2008-2938, upgrade your Apache Tomcat installation to version 6.0.18, 5.5.27, or 4.1.39.
CVE-2008-2938 affects Apache Tomcat versions 4.1.0 to 4.1.37, 5.5.0 to 5.5.26, and 6.0.0 to 6.0.16.
CVE-2008-2938 is a directory traversal vulnerability that enables attackers to read arbitrary files on the server.
Disabling allowLinking and UTF-8 may reduce the risk, but upgrading to a secure version is the recommended solution.