This alert was generated using only banner information. It may be a false positive.
Fixed in Apache Tomcat 6.0.10:
important: Directory traversal CVE-2007-0450
Tomcat permits '\', '%2F' and '%5C' as path delimiters. When Tomcat is used behind a proxy (including, but not limited to, Apache HTTP server with mod_proxy and mod_jk) configured to only proxy some contexts, a HTTP request containing strings like "/\../" may allow attackers to work around the context restriction of the proxy, and access the non-proxied contexts.
The following Java system properties have been added to Tomcat to provide additional control of the handling of path delimiters in URLs (both options default to false):
* org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH: true|false
* org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH: true|false
Due to the impossibility to guarantee that all URLs are handled by Tomcat as they are in proxy servers, Tomcat should always be secured as if no proxy restricting context access was used.
Affected Apache Tomcat version (6.0.0 - 6.0.9).
- important: Directory traversal CVE-2007-0450
- Upgrade Apache Tomcat to the latest version.
- WordPress Plugin Anthologize Cross-Site Scripting (0.7.7)
- WordPress Plugin dsSearchAgent:WordPress Edition Cross-Site Scripting (1.0-beta10)
- Drupal Core 7.x Multiple Vulnerabilities (7.0 - 7.56)
- WordPress Plugin Import Woocommerce Cross-Site Scripting (1.0.1)
- WordPress 4.7.x Multiple Vulnerabilities (4.7 - 4.7.4)