CVE-2010-3718
Published: 10 February 2011
Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
Priority
Status
Package | Release | Status |
---|---|---|
tomcat5.5 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Ignored
|
|
karmic |
Does not exist
|
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1027610 |
||
Binaries built from this source package are in Universe and so are supported by the community. | ||
tomcat6 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
karmic |
Released
(6.0.20-2ubuntu2.4)
|
|
lucid |
Released
(6.0.24-2ubuntu1.7)
|
|
maverick |
Released
(6.0.28-2ubuntu1.2)
|
|
natty |
Not vulnerable
(6.0.28-10)
|
|
upstream |
Released
(6.0.28-10)
|
|
Patches: upstream: http://svn.apache.org/viewvc?view=revision&revision=1022560 |