CVE-2015-5174

NameCVE-2015-5174
DescriptionDirectory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-435-1, DSA-3530-1, DSA-3552-1, DSA-3609-1

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat6sourcesqueeze6.0.45-1~deb6u1DLA-435-1
tomcat6sourcewheezy6.0.45+dfsg-1~deb7u1DSA-3530-1
tomcat6source(unstable)6.0.41-3
tomcat7sourcewheezy7.0.28-4+deb7u4DSA-3552-1
tomcat7sourcejessie7.0.56-3+deb8u2DSA-3552-1
tomcat7source(unstable)7.0.68-1
tomcat8sourcejessie8.0.14-1+deb8u2DSA-3609-1
tomcat8source(unstable)8.0.28-1

Notes

Since 6.0.41-3, src:tomcat6 only builds a servlet and docs
Fixed in 6.0.45, 7.0.65, 8.0.27

Search for package or bug name: Reporting problems