漏洞信息详情
Apache HTTP Server Tomcat远程目录访问漏洞
- CNNVD编号:CNNVD-200703-400
- 危害等级: 中危
- CVE编号:
CVE-2007-0450
- 漏洞类型:
路径遍历
- 发布时间:
2006-06-01
- 威胁类型:
远程
- 更新时间:
2019-04-16
- 厂 商:
apache - 漏洞来源:
David Matscheko -
漏洞简介
Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。
如果将Apache HTTP服务器和Tomcat配置为与常见的代理模块(mod_proxy、mod_rewrite、mod_jk)交互操作的话,攻击者就可以非授权访问预期目标路径以外的目录,直至Tomcat中的Web根目录。Apache中可接受的唯一目录分隔字符是斜线(/),但Tomcat允许URI编码的字符,如/、或\\%5C等,这允许攻击者通过特制的HTTP请求执行访问受保护的文件。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
http://gulus.usherbrooke.ca/pub/appl/apache/tomcat/tomcat-5/v5.5.23/bin/apache-tomcat-5.5.23.tar.gz
http://apache.mirror.rafal.ca/tomcat/tomcat-6/v6.0.10/bin/apache-tomcat-6.0.10.tar.gz
参考网址
来源:SREASON
链接:http://securityreason.com/securityalert/2446
来源:MLIST
来源:CONFIRM
链接:http://docs.info.apple.com/article.html?artnum=306172
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/462791/100/0/threaded
来源:CONFIRM
链接:http://tomcat.apache.org/security-5.html
来源:MLIST
来源:MLIST
来源:MLIST
来源:MLIST
链接:http://lists.vmware.com/pipermail/security-announce/2008/000003.html
来源:SECUNIA
链接:http://secunia.com/advisories/33668
来源:SECUNIA
链接:http://secunia.com/advisories/27037
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2007-0360.html
来源:SECUNIA
链接:http://secunia.com/advisories/26660
来源:SECUNIA
链接:http://secunia.com/advisories/28365
来源:APPLE
链接:http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
来源:SECUNIA
链接:http://secunia.com/advisories/30908
来源:MANDRIVA
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0261.html
来源:CONFIRM
链接:http://tomcat.apache.org/security-6.html
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/485938/100/0/threaded
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2007-0327.html
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2007/3087
来源:MLIST
来源:SECUNIA
链接:http://secunia.com/advisories/25280
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2007/0975
来源:CONFIRM
链接:http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
来源:BID
链接:http://www.securityfocus.com/bid/25159
来源:OVAL
链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10643
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/500396/100/0/threaded
来源:BID
链接:http://www.securityfocus.com/bid/22960
来源:MISC
链接:http://www.sec-consult.com/287.html
来源:MISC
链接:http://www.sec-consult.com/fileadmin/Advisories/20070314-0-apache_tomcat_directory_traversal.txt
来源:GENTOO
链接:http://security.gentoo.org/glsa/glsa-200705-03.xml
来源:SUSE
链接:http://www.novell.com/linux/security/advisories/2007_5_sr.html
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2009/0233
来源:CONFIRM
链接:http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm
来源:MLIST
来源:SECUNIA
链接:http://secunia.com/advisories/24732
来源:SECUNIA
链接:http://secunia.com/advisories/25106
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/32988
来源:SUSE
链接:http://www.novell.com/linux/security/advisories/2007_15_sr.html
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/500412/100/0/threaded
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/1979/references
来源:CONFIRM
链接:http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/0065
来源:SECUNIA
链接:http://secunia.com/advisories/30899
来源:SUNALERT
链接:http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
来源:CONFIRM
链接:http://www.fujitsu.com/global/support/software/security/products-f/interstage-200702e.html
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2007/3386
来源:CONFIRM
链接:http://tomcat.apache.org/security-4.html
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2007/2732
来源:SECUNIA
链接:http://secunia.com/advisories/26235
来源:HP
链接:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795