Description
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3974-1 | tomcat8 security update |
EUVD |
EUVD-2022-2751 | The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL. |
Github GHSA |
GHSA-68g5-8q7f-m384 | Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-17T03:48:21.726Z
Reserved: 2017-04-11T00:00:00.000Z
Link: CVE-2017-7675
No data.
Status : Modified
Published: 2017-08-11T02:29:00.320
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-7675
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA