CVE-2008-5515

N/A Unknown
Published: June 16, 2009 Modified: April 23, 2026
View on NVD

Description

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://jvn.jp/en/jp/JVN63832775/index.html
Source: secalert@redhat.com
Patch
http://secunia.com/advisories/35393
Source: secalert@redhat.com
http://secunia.com/advisories/35685
Source: secalert@redhat.com
http://secunia.com/advisories/35788
Source: secalert@redhat.com
http://secunia.com/advisories/37460
Source: secalert@redhat.com
http://secunia.com/advisories/39317
Source: secalert@redhat.com
http://secunia.com/advisories/42368
Source: secalert@redhat.com
http://secunia.com/advisories/44183
Source: secalert@redhat.com
http://support.apple.com/kb/HT4077
Source: secalert@redhat.com
http://tomcat.apache.org/security-4.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.securityfocus.com/bid/35263
Source: secalert@redhat.com
Patch
http://www.vupen.com/english/advisories/2009/1520
Source: secalert@redhat.com
Patch Vendor Advisory
http://jvn.jp/en/jp/JVN63832775/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://marc.info/?l=bugtraq&m=127420533226623&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=129070310906557&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=136485229118404&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35393
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35685
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35788
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37460
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39317
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/42368
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/44183
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT4077
Source: af854a3a-2127-422b-91ae-364da2661108
http://tomcat.apache.org/security-4.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2011/dsa-2207
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/504170/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/504202/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35263
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1520
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1535
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1856
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/3056
Source: af854a3a-2127-422b-91ae-364da2661108

94 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
72.9%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache