CVE-2015-5345

5.3 MEDIUM
Published: February 25, 2016 Modified: May 06, 2026
View on NVD

Description

The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://seclists.org/bugtraq/2016/Feb/146
Source: secalert@redhat.com
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-7.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-8.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-9.html
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/83328
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-3024-1
Source: secalert@redhat.com
http://marc.info/?l=bugtraq&m=145974991225029&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2016-1089.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2016-2045.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2016-2599.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/bugtraq/2016/Feb/146
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2016/Feb/122
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1715206
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1715207
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1715213
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1715216
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1716882
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1716894
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1717209
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1717212
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1717216
Source: af854a3a-2127-422b-91ae-364da2661108
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-7.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-8.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-9.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2016/dsa-3530
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2016/dsa-3552
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2016/dsa-3609
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/83328
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id/1035071
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-3024-1
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2016:1087
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2016:1088
Source: af854a3a-2127-422b-91ae-364da2661108
https://bto.bluecoat.com/security-advisory/sa118
Source: af854a3a-2127-422b-91ae-364da2661108
https://bz.apache.org/bugzilla/show_bug.cgi?id=58765
Source: af854a3a-2127-422b-91ae-364da2661108
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/201705-09
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20180531-0001/
Source: af854a3a-2127-422b-91ae-364da2661108

102 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.3 / 10.0
EPSS (Exploit Probability)
43.3%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache canonical debian