CVE-2010-3718 Details

CVE-2010-3718

Published: 2011-02-10
Last Modified: 2019-03-25
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.

Analysis
Common Vulnerability Score System v2.0
Severity Low
Base Score 1.2/10
Exploit Score 1.9/10
Access Vector Local
Access Complexity High
Authentication None
Impact Score 2.9/10
Confidentiality Impact None
Availability Impact None
Integrity Impact Partial
Vector String AV:L/AC:H/Au:N/C:N/I:P/A:N
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:* Yes - -
References

http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://marc.info/?l=bugtraq&m=130168502603566&w=2
http://marc.info/?l=bugtraq&m=132215163318824&w=2
http://marc.info/?l=bugtraq&m=136485229118404&w=2
http://marc.info/?l=bugtraq&m=139344343412337&w=2
http://secunia.com/advisories/43192
http://secunia.com/advisories/45022
http://secunia.com/advisories/57126
http://securityreason.com/securityalert/8072
http://support.apple.com/kb/HT5002
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://www.debian.org/security/2011/dsa-2160
http://www.mandriva.com/security/advisories?name=MDVSA-2011:030
http://www.redhat.com/support/errata/RHSA-2011-0791.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://www.redhat.com/support/errata/RHSA-2011-1845.html
http://www.securityfocus.com/archive/1/516211/100/0/threaded
http://www.securityfocus.com/bid/46177
http://www.securitytracker.com/id?1025025
https://exchange.xforce.ibmcloud.com/vulnerabilities/65159
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12517
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13969
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19379

CVE ID
CVE-2010-3718
Published
2011-02-10
Modified
2019-03-25
CVSSv2.0
Low
PCI Compliance
Pass
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.