CVE-2007-0450

Description

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.

Category

5.0
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 89.94% Top 5%
Vendor Advisory sun.com Vendor Advisory novell.com Vendor Advisory apple.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory hp.com Vendor Advisory redhat.com Vendor Advisory gentoo.org Vendor Advisory mandriva.com Vendor Advisory novell.com Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://tomcat.apache.org/security-4.html vendor advisory
http://secunia.com/advisories/30908 third party advisory
http://lists.vmware.com/pipermail/security-announce/2008/000003.html third party advisory mailing list
http://www.vupen.com/english/advisories/2007/2732 third party advisory vdb entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1 vendor advisory broken link
http://www.vupen.com/english/advisories/2007/3087 third party advisory vdb entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/32988 third party advisory vdb entry
http://secunia.com/advisories/30899 third party advisory
http://www.vupen.com/english/advisories/2008/1979/references third party advisory vdb entry
http://www.novell.com/linux/security/advisories/2007_5_sr.html vendor advisory broken link
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html vendor advisory mailing list third party advisory
http://www.vupen.com/english/advisories/2008/0065 third party advisory vdb entry
http://www.securityfocus.com/archive/1/500412/100/0/threaded mailing list third party advisory vdb entry
http://secunia.com/advisories/33668 third party advisory
http://www.securityfocus.com/archive/1/485938/100/0/threaded mailing list third party advisory vdb entry
http://www.securityfocus.com/archive/1/500396/100/0/threaded mailing list third party advisory vdb entry
http://secunia.com/advisories/25280 third party advisory
http://www.redhat.com/support/errata/RHSA-2007-0360.html third party advisory vendor advisory
http://secunia.com/advisories/24732 third party advisory
http://www.vupen.com/english/advisories/2009/0233 third party advisory vdb entry
http://www.securityfocus.com/bid/22960 third party advisory vdb entry
http://secunia.com/advisories/28365 third party advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm third party advisory
http://tomcat.apache.org/security-6.html vendor advisory
http://www.sec-consult.com/287.html broken link
http://www.vupen.com/english/advisories/2007/3386 third party advisory vdb entry
http://www.sec-consult.com/fileadmin/Advisories/20070314-0-apache_tomcat_directory_traversal.txt broken link
http://www.redhat.com/support/errata/RHSA-2007-0327.html third party advisory vendor advisory
http://secunia.com/advisories/27037 third party advisory
http://docs.info.apple.com/article.html?artnum=306172 third party advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 vendor advisory broken link
http://www.vupen.com/english/advisories/2007/0975 third party advisory vdb entry
http://tomcat.apache.org/security-5.html vendor advisory
http://www.securityfocus.com/bid/25159 third party advisory vdb entry
http://secunia.com/advisories/26660 third party advisory
http://www.redhat.com/support/errata/RHSA-2008-0261.html third party advisory vendor advisory
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200702e.html third party advisory
http://security.gentoo.org/glsa/glsa-200705-03.xml third party advisory vendor advisory
http://secunia.com/advisories/25106 third party advisory
http://securityreason.com/securityalert/2446 third party advisory
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx broken link
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 third party advisory broken link
http://www.securityfocus.com/archive/1/462791/100/0/threaded mailing list third party advisory vdb entry
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241 third party advisory vendor advisory
http://www.novell.com/linux/security/advisories/2007_15_sr.html vendor advisory broken link
http://secunia.com/advisories/26235 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10643 signature third party advisory vdb entry
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E mailing list
https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E mailing list

Frequently Asked Questions

What is the severity of CVE-2007-0450?
CVE-2007-0450 has been scored as a medium severity vulnerability.
How to fix CVE-2007-0450?
To fix CVE-2007-0450, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2007-0450 being actively exploited in the wild?
It is possible that CVE-2007-0450 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~90% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.