ID |
CVE-2006-3835
|
Summary |
Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 25-03-2019 - 11:29) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
redhat
via4
|
advisories | | rpms | - jakarta-commons-modeler-0:2.0-3jpp_2rh
- jakarta-commons-modeler-javadoc-0:2.0-3jpp_2rh
- tomcat5-0:5.5.23-0jpp_4rh.3
- tomcat5-admin-webapps-0:5.5.23-0jpp_4rh.3
- tomcat5-common-lib-0:5.5.23-0jpp_4rh.3
- tomcat5-jasper-0:5.5.23-0jpp_4rh.3
- tomcat5-jasper-javadoc-0:5.5.23-0jpp_4rh.3
- tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.3
- tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp_4rh.3
- tomcat5-server-lib-0:5.5.23-0jpp_4rh.3
- tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.3
- tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp_4rh.3
- tomcat5-webapps-0:5.5.23-0jpp_4rh.3
- tomcat5-0:5.0.30-0jpp_5rh
- tomcat5-admin-webapps-0:5.0.30-0jpp_5rh
- tomcat5-webapps-0:5.0.30-0jpp_5rh
- jakarta-commons-pool-0:1.2-2jpp_2rh
- tomcat5-0:5.0.30-0jpp_6rh
- tyrex-0:1.0.1-2jpp_2rh
- jabberd-0:2.0s10-3.38.rhn
- java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4
- java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el4
- jfreechart-0:0.9.20-3.rhn
- openmotif21-0:2.1.30-11.RHEL4.6
- openmotif21-debuginfo-0:2.1.30-11.RHEL4.6
- perl-Crypt-CBC-0:2.24-1.el4
- rhn-apache-0:1.3.27-36.rhn.rhel4
- rhn-modjk-ap13-0:1.2.23-2rhn.rhel4
- rhn-modperl-0:1.29-16.rhel4
- rhn-modssl-0:2.8.12-8.rhn.10.rhel4
- tomcat5-0:5.0.30-0jpp_10rh
- jabberd-0:2.0s10-3.37.rhn
- jabberd-0:2.0s10-3.38.rhn
- java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3
- java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4
- java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el3
- java-1.4.2-ibm-devel-0:1.4.2.10-1jpp.2.el4
- jfreechart-0:0.9.20-3.rhn
- openmotif21-0:2.1.30-11.RHEL4.6
- openmotif21-0:2.1.30-9.RHEL3.8
- openmotif21-debuginfo-0:2.1.30-11.RHEL4.6
- openmotif21-debuginfo-0:2.1.30-9.RHEL3.8
- perl-Crypt-CBC-0:2.24-1.el3
- perl-Crypt-CBC-0:2.24-1.el4
- rhn-apache-0:1.3.27-36.rhn.rhel3
- rhn-apache-0:1.3.27-36.rhn.rhel4
- rhn-modjk-ap13-0:1.2.23-2rhn.rhel3
- rhn-modjk-ap13-0:1.2.23-2rhn.rhel4
- rhn-modperl-0:1.29-16.rhel3
- rhn-modperl-0:1.29-16.rhel4
- rhn-modssl-0:2.8.12-8.rhn.10.rhel3
- rhn-modssl-0:2.8.12-8.rhn.10.rhel4
- tomcat5-0:5.0.30-0jpp_10rh
- ant-0:1.6.5-1jpp_1rh
- avalon-logkit-0:1.2-2jpp_4rh
- axis-0:1.2.1-1jpp_3rh
- classpathx-jaf-0:1.0-2jpp_6rh
- classpathx-mail-0:1.1.1-2jpp_8rh
- geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh
- geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh
- geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh
- geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh
- geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh
- geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh
- geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh
- geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh
- geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh
- geronimo-specs-0:1.0-0.M4.1jpp_10rh
- geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh
- jakarta-commons-modeler-0:2.0-3jpp_2rh
- log4j-0:1.2.12-1jpp_1rh
- mx4j-1:3.0.1-1jpp_4rh
- pcsc-lite-0:1.3.3-3.el4
- pcsc-lite-debuginfo-0:1.3.3-3.el4
- pcsc-lite-doc-0:1.3.3-3.el4
- pcsc-lite-libs-0:1.3.3-3.el4
- rhpki-ca-0:7.3.0-20.el4
- rhpki-java-tools-0:7.3.0-10.el4
- rhpki-kra-0:7.3.0-14.el4
- rhpki-manage-0:7.3.0-19.el4
- rhpki-native-tools-0:7.3.0-6.el4
- rhpki-ocsp-0:7.3.0-13.el4
- rhpki-tks-0:7.3.0-13.el4
- tomcat5-0:5.5.23-0jpp_4rh.16
- tomcat5-common-lib-0:5.5.23-0jpp_4rh.16
- tomcat5-jasper-0:5.5.23-0jpp_4rh.16
- tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16
- tomcat5-server-lib-0:5.5.23-0jpp_4rh.16
- tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16
- xerces-j2-0:2.7.1-1jpp_1rh
- xml-commons-0:1.3.02-2jpp_1rh
- xml-commons-apis-0:1.3.02-2jpp_1rh
|
|
refmap
via4
|
bid | 19106 | bugtraq | - 20070509 SEC Consult SA-20070509-0 :: Multiple vulnerabilites in Nokia Intellisync Mobile Suite & Wireless Email Express
- 20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities
- 20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)
- 20091107 ToutVirtual VirtualIQ Multiple Vulnerabilities
| confirm | | fulldisc | 20060721 Directory Listing in Apache Tomcat 5.x.x | misc | | mlist | - [tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
- [tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
- [tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/
| sectrack | 1016576 | secunia | - 25212
- 30899
- 30908
- 33668
- 37297
| sunalert | 239312 | suse | SUSE-SR:2009:004 | vupen | - ADV-2007-1727
- ADV-2008-1979
- ADV-2009-0233
| xf | - apache-tomcat-url-information-disclosure(27902)
- nokia-tomcat-source-code-disclosure(34183)
|
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2006-08-24 | organization | Red Hat | statement | This issue is not a security issue in Tomcat itself, but is caused when directory listings are enabled.
Details on how to disable directory listings are available at: http://tomcat.apache.org/faq/misc.html#listing |
|
Last major update |
25-03-2019 - 11:29 |
Published |
25-07-2006 - 13:22 |
Last modified |
25-03-2019 - 11:29 |