Upstream information

CVE-2007-0450 at MITRE

Description

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 254482 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Open Enterprise Server
  • jakarta-tomcat >= 5.0.19-29.5
core9.x86
core9.s390
YOU Patch Nr: 11528
SUSE LINUX 10.0
  • tomcat5 >= 5.0.30-10
  • tomcat5-admin-webapps >= 5.0.30-10
  • tomcat5-webapps >= 5.0.30-10
SUSE LINUX 10.1
  • tomcat5 >= 5.0.30-27.14
  • tomcat5-admin-webapps >= 5.0.30-27.14
  • tomcat5-webapps >= 5.0.30-27.14
SUSE LINUX 10.0
  • tomcat5 >= 5.0.30-8
  • tomcat5-admin-webapps >= 5.0.30-8
  • tomcat5-webapps >= 5.0.30-8
SUSE LINUX 10.1
  • tomcat5 >= 5.0.30-27.5.3
  • tomcat5-admin-webapps >= 5.0.30-27.5.3
  • tomcat5-webapps >= 5.0.30-27.5.3
SUSE LINUX 9.3
  • tomcat5 >= 5.0.30-4.3
  • tomcat5-admin-webapps >= 5.0.30-4.3
  • tomcat5-webapps >= 5.0.30-4.3