Miggo Logo

CVE-2007-5461: Apache Tomcat Path Traversal Vulnerability

3.5

CVSS Score

Basic Information

EPSS Score
0.91111%
Published
5/1/2022
Updated
1/8/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:M/Au:S/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.tomcat:tomcatmaven>= 4.0.0, <= 4.0.6
org.apache.tomcat:tomcatmaven= 4.1.0
org.apache.tomcat:tomcatmaven= 5.0.0
org.apache.tomcat:tomcatmaven>= 5.5.0, <= 5.5.25
org.apache.tomcat:tomcatmaven>= 6.0.0, <= 6.0.14

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper XML parsing in WebDAV requests. The commit 1e7b31e fixes CVE-2007-5461 by adding documentBuilderFactory.setExpandEntityReferences(false) in WebdavServlet.java. This indicates the original vulnerability was caused by processing external entity references in XML parsing, which could be exploited via SYSTEM entities to access local files. The getDocumentBuilder() function was vulnerable because it didn't disable this dangerous feature initially.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**solut* p*t* tr*v*rs*l vuln*r**ility in *p**** Tom**t *.*.* t*rou** *.*.*, *.*.*, *.*.*, *.*.* t*rou** *.*.**, *n* *.*.* t*rou** *.*.**, un**r **rt*in *on*i*ur*tions, *llows r*mot* *ut**nti**t** us*rs to r*** *r*itr*ry *il*s vi* * W****V writ* r*qu*

Reasoning

T** vuln*r**ility st*ms *rom improp*r XML p*rsin* in W****V r*qu*sts. T** *ommit ******* *ix*s *V*-****-**** *y ***in* `*o*um*nt*uil**r***tory.s*t*xp*n**ntityR***r*n**s(**ls*)` in `W****vS*rvl*t.j*v*`. T*is in*i**t*s t** ori*in*l vuln*r**ility w*s **