fkie_cve-2005-4836
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2024-11-21 00:05
Severity ?
Summary
The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | tomcat | 4.1.15 | |
apache | tomcat | 4.1.16 | |
apache | tomcat | 4.1.17 | |
apache | tomcat | 4.1.18 | |
apache | tomcat | 4.1.19 | |
apache | tomcat | 4.1.20 | |
apache | tomcat | 4.1.21 | |
apache | tomcat | 4.1.22 | |
apache | tomcat | 4.1.23 | |
apache | tomcat | 4.1.24 | |
apache | tomcat | 4.1.25 | |
apache | tomcat | 4.1.26 | |
apache | tomcat | 4.1.27 | |
apache | tomcat | 4.1.28 | |
apache | tomcat | 4.1.29 | |
apache | tomcat | 4.1.29 | |
apache | tomcat | 4.1.30 | |
apache | tomcat | 4.1.31 | |
apache | tomcat | 4.1.32 | |
apache | tomcat | 4.1.33 | |
apache | tomcat | 4.1.34 | |
apache | tomcat | 4.1.35 | |
apache | tomcat | 4.1.36 | |
apache | tomcat | 4.1.37 | |
apache | tomcat | 4.1.39 | |
apache | tomcat | 4.1.40 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*", matchCriteriaId: "1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*", matchCriteriaId: "FB43F47F-5BF9-43A0-BF0E-451B4A8F7137", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*", matchCriteriaId: "DFFFE700-AAFE-4F5B-B0E2-C3DA76DE492D", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*", matchCriteriaId: "11DDD82E-5D83-4581-B2F3-F12655BBF817", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*", matchCriteriaId: "8A0F0C91-171E-421D-BE86-11567DEFC7BD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*", matchCriteriaId: "F22D2621-D305-43CE-B00D-9A7563B061F7", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*", matchCriteriaId: "9A5D55E8-D3A3-4784-8AC6-CCB07E470AB2", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*", matchCriteriaId: "7F4245BA-B05C-49DE-B2E0-1E588209ED3B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*", matchCriteriaId: "8633532B-9785-4259-8840-B08529E20DCC", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*", matchCriteriaId: "B1D9BD7E-FCC2-404B-A057-1A10997DAFF9", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*", matchCriteriaId: "F935ED72-58F4-49C1-BD9F-5473E0B9D8CE", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*", matchCriteriaId: "FADB75DC-8713-4F0C-9F06-30DA6F6EF6B8", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*", matchCriteriaId: "2EA52901-2D16-4F7E-BF5E-780B42A55D6A", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.28:alpha:*:*:*:*:*:*", matchCriteriaId: "65C47E50-048C-4C2E-9896-5B70AC63CFF3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*", matchCriteriaId: "8BF6952D-6308-4029-8B63-0BD9C648C60F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.29:alpha:*:*:*:*:*:*", matchCriteriaId: "02F88EFB-520A-40E7-AE4D-B167B2AC2EFF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*", matchCriteriaId: "94941F86-0BBF-4F30-8F13-FB895A11ED69", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*", matchCriteriaId: "17522878-4266-432A-859D-C02096C8AC0E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*", matchCriteriaId: "951FFCD7-EAC2-41E6-A53B-F90C540327E8", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*", matchCriteriaId: "BF1F2738-C7D6-4206-9227-43F464887FF5", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*", matchCriteriaId: "98EEB6F2-A721-45CF-A856-0E01B043C317", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.35:*:*:*:*:*:*:*", matchCriteriaId: "02FDE602-A56A-477E-B704-41AF92EEBB9D", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*", matchCriteriaId: "5A28B11A-3BC7-41BC-8970-EE075B029F5C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.37:*:*:*:*:*:*:*", matchCriteriaId: "4AD3E84C-9A2E-4586-A09E-CBDEB1E7F695", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.39:*:*:*:*:*:*:*", matchCriteriaId: "D8F3B31D-8974-4016-ACAF-E7A917C99F84", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:tomcat:4.1.40:*:*:*:*:*:*:*", matchCriteriaId: "7E49C8D7-1789-4518-9DC8-D8A8FEAF4233", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not reject NULL bytes in a URL when allowLinking is configured, which allows remote attackers to read JSP source files and obtain sensitive information.", }, ], id: "CVE-2005-4836", lastModified: "2024-11-21T00:05:17.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 7.8, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-12-31T05:00:00.000", references: [ { source: "secalert@redhat.com", url: "http://tomcat.apache.org/security-4.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/28483", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://tomcat.apache.org/security-4.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/28483", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.