Get a Pentest and security assessment of your IT network.

Advisories

Mandriva Linux Security Advisory 2010-177

Mandriva Linux Security Advisory 2010-177 – Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a. in an entry in a WAR file, as demonstrated by a././bin/catalina.bat entry. The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests. Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the.war filename. Other issues have also been addressed.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/93756/MDVSA-2010-177.txt

Source: https://packetstormsecurity.com/files/93756/Mandriva-Linux-Security-Advisory-2010-177.html

Related posts
Advisories

Secunia Security Advisory 15017

Advisories

Secunia Security Advisory 18394

Advisories

Secunia Security Advisory 21136

Advisories

Secunia Security Advisory 24114