Description
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
Remediation
References
Related Vulnerabilities
Artifactory Incorrect Default Permissions Vulnerability (CVE-2021-46270)
Zope Web Application Server Other Vulnerability (CVE-2007-0240)
WordPress Plugin Caldera Forms-More Than Contact Forms Cross-Site Scripting (1.5.4)
WordPress Plugin FileBird-WordPress Media Library Folders & File Manager Cross-Site Scripting (2.4)