vulnerability
Red Hat JBoss EAP: CVE-2015-5174: Path Traversal
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Feb 22, 2016 | Sep 19, 2024 | Jul 2, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Feb 22, 2016
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.. A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-22
- CVE-2015-5174
- https://attackerkb.com/topics/CVE-2015-5174
- URL-https://access.redhat.com/security/cve/CVE-2015-5174
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1265698
- URL-http://seclists.org/bugtraq/2016/Feb/149
- URL-https://access.redhat.com/errata/RHSA-2016:1432
- URL-https://access.redhat.com/errata/RHSA-2016:1433
- URL-https://access.redhat.com/errata/RHSA-2016:1434
- URL-https://access.redhat.com/errata/RHSA-2016:1435
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.