Limited directory traversal in Apache Tomcat and Oracle Linux - CVE-2015-5174
Published: August 5, 2016 / Updated: January 11, 2017
Oracle
Apache Tomcat
Oracle Linux
Detailed vulnerability description
The vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to incorrect validation of paths in getResource(), getResourceAsStream() and getResourcePaths() methods within ServletContext. A local attacker can bypass security manager restrictions using directory traversal sequences and view directory listing outside the $CATALINA_BASE/webapps folder.
Successful exploitation of the vulnerability may allow a local attacker to obtain names of files and folder on vulnerable system.
How to mitigate CVE-2015-5174
Sources
- https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.45
- https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.65
- https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.27
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html