Miggo Logo

CVE-2009-2693: Apache Tomcat Directory Traversal vulnerability

5.8

CVSS Score

Basic Information

EPSS Score
0.94301%
Published
5/2/2022
Updated
2/21/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:N/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.tomcat:tomcatmaven>= 5.5.0, <= 5.5.285.5.29
org.apache.tomcat:tomcatmaven>= 6.0.0, < 6.0.246.0.24

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from insufficient path validation in three key areas: (1) WebappClassLoader's resource extraction allowed JAR entries to escape the loader directory via path traversal, (2) ExpandWar's WAR expansion did not enforce docBase boundaries, and (3) HostConfig's WAR filename-to-context-path mapping permitted directory traversal sequences. The commit explicitly adds canonical path checks (e.g., startsWith(canonicalLoaderDir)) and filename validation to address these flaws, confirming these functions were the vulnerable points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ir**tory tr*v*rs*l vuln*r**ility in *p**** Tom**t *.*.* t*rou** *.*.** *n* *.*.* t*rou** *.*.** *llows r*mot* *tt**k*rs to *r**t* or ov*rwrit* *r*itr*ry *il*s vi* * `..` (*ot *ot) in *n *ntry in * W*R *il*, *s **monstr*t** *y * `../../*in/**t*lin*.*

Reasoning

T** vuln*r**ility st*mm** *rom insu**i*i*nt p*t* v*li**tion in t*r** k*y *r**s: (*) `W***pp*l*ssLo***r`'s r*sour** *xtr**tion *llow** J*R *ntri*s to *s**p* t** lo***r *ir**tory vi* p*t* tr*v*rs*l, (*) `*xp*n*W*r`'s W*R *xp*nsion *i* not *n*or** *o***