[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-5461Date: (C)2007-10-15   (M)2023-12-22


Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 3.5
Exploit Score: 6.8
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: SINGLE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1018864
http://marc.info/?l=full-disclosure&m=119239530508382
http://www.securityfocus.com/archive/1/507985/100/0/threaded
SUNALERT-239312
BID-26070
SECUNIA-27398
SECUNIA-27446
SECUNIA-27481
SECUNIA-27727
SECUNIA-28317
SECUNIA-28361
SECUNIA-29242
SECUNIA-29313
SECUNIA-29711
SECUNIA-30676
SECUNIA-30802
SECUNIA-30899
SECUNIA-30908
SECUNIA-31493
BID-31681
SECUNIA-32120
SECUNIA-32222
SECUNIA-32266
SECUNIA-37460
EXPLOIT-DB-4530
SECUNIA-57126
ADV-2007-3622
ADV-2007-3671
ADV-2007-3674
ADV-2008-1856
ADV-2008-1979
ADV-2008-1981
ADV-2008-2780
ADV-2008-2823
ADV-2009-3316
APPLE-SA-2008-06-30
APPLE-SA-2008-10-09
DSA-1447
DSA-1453
FEDORA-2007-3456
GLSA-200804-10
HPSBST02955
MDKSA-2007:241
MDVSA-2009:136
RHSA-2008:0042
RHSA-2008:0195
RHSA-2008:0261
RHSA-2008:0630
RHSA-2008:0862
SUSE-SR:2008:005
SUSE-SR:2009:004
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E
http://mail-archives.apache.org/mod_mbox/tomcat-users/200710.mbox/%3C47135C2D.1000705%40apache.org%3E
apache-tomcat-webdav-dir-traversal(37243)
http://geronimo.apache.org/2007/10/18/potential-vulnerability-in-apache-tomcat-webdav-servlet.html
http://issues.apache.org/jira/browse/GERONIMO-3549
http://support.apple.com/kb/HT2163
http://support.apple.com/kb/HT3216
http://support.avaya.com/elmodocs2/security/ASA-2008-401.htm
http://tomcat.apache.org/security-4.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://www-1.ibm.com/support/docview.wss?uid=swg21286112
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
oval:org.mitre.oval:def:9202

CPE    19
cpe:/a:apache:tomcat:4.1.2
cpe:/a:apache:tomcat:4.0.3
cpe:/a:apache:tomcat:4.1.1
cpe:/a:apache:tomcat:4.0.2
...
CWE    1
CWE-22
OVAL    3
oval:org.secpod.oval:def:300556
oval:org.mitre.oval:def:7988
oval:org.mitre.oval:def:7989

© SecPod Technologies