CVE-2008-2938
Summary
| CVE | CVE-2008-2938 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-08-13 00:41:00 UTC |
| Updated | 2023-11-07 02:02:00 UTC |
| Description | Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Tomcat | 6.0.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.1 | All | All | All |
| Application | Apache | Tomcat | 6.0.10 | All | All | All |
| Application | Apache | Tomcat | 6.0.11 | All | All | All |
| Application | Apache | Tomcat | 6.0.12 | All | All | All |
| Application | Apache | Tomcat | 6.0.13 | All | All | All |
| Application | Apache | Tomcat | 6.0.14 | All | All | All |
| Application | Apache | Tomcat | 6.0.15 | All | All | All |
| Application | Apache | Tomcat | 6.0.2 | All | All | All |
| Application | Apache | Tomcat | 6.0.3 | All | All | All |
| Application | Apache | Tomcat | 6.0.4 | All | All | All |
| Application | Apache | Tomcat | 6.0.5 | All | All | All |
| Application | Apache | Tomcat | 6.0.6 | All | All | All |
| Application | Apache | Tomcat | 6.0.7 | All | All | All |
| Application | Apache | Tomcat | 6.0.8 | All | All | All |
| Application | Apache | Tomcat | 6.0.9 | All | All | All |
| Application | Apache | Tomcat | 6.0.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.1 | All | All | All |
| Application | Apache | Tomcat | 6.0.10 | All | All | All |
| Application | Apache | Tomcat | 6.0.11 | All | All | All |
| Application | Apache | Tomcat | 6.0.12 | All | All | All |
| Application | Apache | Tomcat | 6.0.13 | All | All | All |
| Application | Apache | Tomcat | 6.0.14 | All | All | All |
| Application | Apache | Tomcat | 6.0.15 | All | All | All |
| Application | Apache | Tomcat | 6.0.2 | All | All | All |
| Application | Apache | Tomcat | 6.0.3 | All | All | All |
| Application | Apache | Tomcat | 6.0.4 | All | All | All |
| Application | Apache | Tomcat | 6.0.5 | All | All | All |
| Application | Apache | Tomcat | 6.0.6 | All | All | All |
| Application | Apache | Tomcat | 6.0.7 | All | All | All |
| Application | Apache | Tomcat | 6.0.8 | All | All | All |
| Application | Apache | Tomcat | 6.0.9 | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache Software Foundation | Tomcat | 6.0.16 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 6.0.16 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Security Advisories | Mandriva Linux | MANDRIVA | www.mandriva.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2008:018 | SUSE | lists.opensuse.org | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| ASA-2008-401 (RHSA-2008-0862) | CONFIRM | support.avaya.com | |
| Red Hat update for tomcat - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| access.redhat.com | REDHAT | www.redhat.com | |
| SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| HP-UX update for Apache - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| SecurityTracker.com Archives - Tomcat UTF-8 'AllowLinking' Java Bug Lets Remote Users Traverse the Directory | SECTRACK | www.securitytracker.com | |
| [SECURITY] Fedora 8 Update: tomcat5-5.5.27-0jpp.2.fc8 | FEDORA | www.redhat.com | |
| Pony Mail! | MISC | lists.apache.org | |
| ToutVirtual VirtualIQ Pro Multiple Vulnerabilities - Advisories - Community | SECUNIA | secunia.com | |
| Apple Mac OS X Security Update Fixes Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| SecurityReason - Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability | SREASON | securityreason.com | |
| RETIRED: Apple Mac OS X 2008-007 Multiple Security Vulnerabilities | BID | www.securityfocus.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| US-CERT Vulnerability Note VU#343355 | CERT-VN | www.kb.cert.org | US Government Resource |
| access.redhat.com | REDHAT | www.redhat.com | |
| About Security Update 2008-007 | CONFIRM | support.apple.com | |
| Fedora update for tomcat6 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Apache Tomcat® - Apache Tomcat 4.x vulnerabilities | CONFIRM | tomcat.apache.org | |
| access.redhat.com | REDHAT | www.redhat.com | |
| Apache Tomcat - Apache Tomcat 5 vulnerabilities | CONFIRM | tomcat.apache.org | |
| APPLE-SA-2008-10-09 Security Update 2008-007 | APPLE | lists.apple.com | |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:004 | SUSE | lists.opensuse.org | |
| Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability | EXPLOIT-DB | www.exploit-db.com | |
| Pony Mail! | MISC | lists.apache.org | |
| [SECURITY] Fedora 9 Update: tomcat6-6.0.18-1.1.fc9 | FEDORA | www.redhat.com | |
| Avaya AES / MX Apache Tomcat Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| [SECURITY] Fedora 9 Update: tomcat5-5.5.27-0jpp.2.fc9 | FEDORA | www.redhat.com | |
| 404 Not Found | MISC | www.securenetwork.it | |
| Multiple Java Runtime Implementations UTF-8 Input Validation Vulnerability | BID | www.securityfocus.com | |
| Fedora update for tomcat5 - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| HPSBUX02401 | HP | marc.info | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Red Hat update for tomcat - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Apache Tomcat® - Apache Tomcat 6 vulnerabilities | CONFIRM | tomcat.apache.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 997489 Java (Maven) Security Update for org.apache.tomcat:tomcat (GHSA-m7xj-ccqc-p4g2)