Description
When using a VirtualDirContext it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
Remediation
Users of the affected versions should apply one of the following
mitigations:
- Upgrade to Apache Tomcat 7.0.81
References
Related Vulnerabilities
WordPress Plugin Duplicator-WordPress Migration Arbitrary File Download (1.3.26)
Drupal Core 9.0.x Information Disclosure (9.0.0 - 9.0.5)
WebLogic Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-10334)
Struts 2 Config Browser plugin enabled
WordPress Plugin Credova_Financial Information Disclosure (1.4.8)