1.2 CVE-2010-3718
Apache Tomcat 7.0.0 à 7.0.3, 6.0.x, et 5.5.x, lorsqu'il est exécuté au sein d'un SecurityManager, ne rend pas l'attribut ServletContext en lecture seule, ce qui permet aux applications web locales de lire ou d'écrire des fichiers en dehors du répertoire de travail prévu, comme le démontre une attaque par traversée de répertoire.
https://nvd.nist.gov/vuln/detail/CVE-2010-3718
Catégories
CWE-NVD-Other
Références
APPLE
BID
BUGTRAQ
CONFIRM
http://support.apple.com/kb/HT5002 |
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html |
DEBIAN
HP
MANDRIVA
MISC
OVAL
REDHAT
SECTRACK
SECUNIA
SREASON
SUSE
XF
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* | ||
Configuration 3 | ||
cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
Pas d'exploit connu |
Autres (github, ...)
Url |
---|
Pas d'exploit connu |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | sévérité |
---|---|---|
Pas d'entrée |
MITRE
Sherlock® flash
Prenez une photo de votre réseau informatique en quelques clics !
La solution d'audit Sherlock® flash vous permet de réaliser un audit pour renforcer la sécurité de votre parc informatique. Analyse des vulnérabilités de vos équipements physiques et virtuels. Planification des correctifs par niveau de priorité et temps disponible. Rapports détaillés et intuitifs.
