Apache Tomcat Leaks Pathname Information via Error Message
Moderate severity
GitHub Reviewed
Published
Apr 30, 2022
to the GitHub Advisory Database
•
Updated Apr 3, 2025
Description
Published by the National Vulnerability Database
Dec 31, 2002
Published to the GitHub Advisory Database
Apr 30, 2022
Reviewed
Apr 3, 2025
Last updated
Apr 3, 2025
Apache Tomcat 4.0.1 allows remote attackers to obtain the web root path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3) </, and (4) %20/, which leaks the pathname in an error message.
References