{"vuid":"VU#343355","idnumber":"343355","name":"Apache Tomcat UTF8 Directory Traversal Vulnerability","keywords":["Apache","Tomcat","UTF8","Directory Traversal","remote file disclosure"],"overview":"Apache Tomcat contains a vulnerability that may allow directory traversal.","clean_desc":"Apache Tomcat is an implementation of the Java Servlet and JavaServer Page (JSP) technologies. Apache Tomcat contains a vulnerability in the way malformed requests are handled. According to the Apache Tomcat 6.x Vulnerabilities page: If a context is configured with allowLinking=\"true\" and the connector is configured with URIEncoding=\"UTF-8\" then a malformed request may be used to access arbitrary files on the server. This vulnerability affects versions 4.1.0-4.1.37, 5.5.0-5.5.26, and 6.0.0-6.0.16. Note that we are aware of publicly-available exploit code for this vulnerability.","impact":"A remote attacker could gain access to arbitrary files on the server.","resolution":"Apply an update\nThis vulnerability is addressed in Apache Tomcat 4.1.38, 5.5.27, and 6.0.18. Please check the Apache Tomcat Security page for availability of fixes for this and other versions of Tomcat.","workarounds":"","sysaffected":"","thanks":"This issue was reported by William A. Rowe of Apache.","author":"This document was written by Chris Taschner.","public":["h","t","t","p",":","/","/","t","o","m","c","a","t",".","a","p","a","c","h","e",".","o","r","g","/","s","e","c","u","r","i","t","y",".","h","t","m","l"],"cveids":["CVE-2008-2938"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-08-11T20:37:51Z","publicdate":"2008-08-11T00:00:00Z","datefirstpublished":"2008-08-19T20:28:13Z","dateupdated":"2008-08-19T20:29:03Z","revision":5,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"10","cam_population":"8","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"17","cam_scorecurrent":"7.14","cam_scorecurrentwidelyknown":"8.16","cam_scorecurrentwidelyknownexploited":"10.2","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.14,"vulnote":null}