Description
When using a VirtualDirContext it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
Remediation
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 7.0.81
References
Related Vulnerabilities
Arbitrary file existence disclosure in Action Pack
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2021-32028)
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3818)