First published: Tue Jun 16 2009(Updated: )
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.20 | 6.0.20 |
maven/org.apache.tomcat:tomcat | >=5.5.0<5.5.28 | 5.5.28 |
maven/org.apache.tomcat:tomcat | >=4.1.0<4.1.40 | 4.1.40 |
Tomcat | =5.5.27 | |
Tomcat | =4.1.2 | |
Tomcat | =4.1.35 | |
Tomcat | =4.1.36 | |
Tomcat | =5.5.18 | |
Tomcat | =4.1.21 | |
Tomcat | =6.0.6 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.14 | |
Tomcat | =4.1.24 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.1 | |
Tomcat | =6.0.7 | |
Tomcat | =5.5.11 | |
Tomcat | =4.1.25 | |
Tomcat | =6.0.4 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.26 | |
Tomcat | =4.1.39 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.5 | |
Tomcat | =4.1.27 | |
Tomcat | =6.0.15 | |
Tomcat | =4.1.30 | |
Tomcat | =4.1.38 | |
Tomcat | =4.1.11 | |
Tomcat | =5.5.21 | |
Tomcat | =4.1.18 | |
Tomcat | =5.5.22 | |
Tomcat | =4.1.14 | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.3 | |
Tomcat | =4.1.19 | |
Tomcat | =6.0.9 | |
Tomcat | =4.1.31 | |
Tomcat | =5.5.3 | |
Tomcat | =4.1.16 | |
Tomcat | =4.1.29 | |
Tomcat | =6.0.17 | |
Tomcat | =4.1.22 | |
Tomcat | =6.0 | |
Tomcat | =4.1.26 | |
Tomcat | =4.1.13 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.25 | |
Tomcat | =6.0.0 | |
Tomcat | =4.1.17 | |
Tomcat | =6.0.14 | |
Tomcat | =5.5.2 | |
Tomcat | =4.1.33 | |
Tomcat | =5.5.0 | |
Tomcat | =4.1.1 | |
Tomcat | =5.5.13 | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.12 | |
Tomcat | =5.5.24 | |
Tomcat | =4.1.12 | |
Tomcat | =4.1.28 | |
Tomcat | =6.0.18 | |
Tomcat | =4.1.15 | |
Tomcat | =4.1.10 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.16 | |
Tomcat | =4.1.0 | |
Tomcat | =6.0.5 | |
Tomcat | =4.1.20 | |
Tomcat | =5.5.17 | |
Tomcat | =4.1.3 | |
Tomcat | =5.5.19 | |
Tomcat | =4.1.23 | |
Tomcat | =4.1.34 | |
Tomcat | =4.1.32 | |
Tomcat | =4.1.37 | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.13 | |
Tomcat | =5.5.23 | |
Tomcat | =6.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-5515 is considered high due to the potential for unauthorized access to restricted resources.
You can fix CVE-2008-5515 by upgrading to Apache Tomcat version 5.5.28, 6.0.20, or 4.1.40, which contain the necessary patches.
Apache Tomcat versions 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 are affected by CVE-2008-5515.
Yes, CVE-2008-5515 can allow remote attackers to bypass access restrictions, potentially leading to data breaches.
CVE-2008-5515 is a path traversal vulnerability that exploits improper pathname normalization in Apache Tomcat.