Vulnerability identifier: #VU262
Vulnerability risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Apache Tomcat
Server applications /
Web servers
Oracle Linux
Operating systems & Components /
Operating system
Vendor:
Apache Foundation
Oracle
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information.
When accessing a directory protected by a security constraint with a URL that did not end in a slash, Tomcat would redirect to the URL with the trailing slash thereby confirming the presence of the directory before processing the security constraint. It was therefore possible for a user to determine if a directory existed or not, even if the user was not permitted to view the directory.
Successful exploitation of the vulnerability may allow a remote attacker to confirm existence of directories on the system.
Mitigation
Install the latest version Apache Tomcat 6.0.45, 7.0.68, 8.0.30 or 9.0.0.M3
Vulnerable software versions
Apache Tomcat: 6.0.0 - 6.0.44, 7.0.0 - 7.0.67, 8.0.0 - 8.0.29, 9.0.0-M1 - 9.0.0-M2
:
Oracle Linux: 7
External links
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.45
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.