Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5351

Опубликовано: 25 фев. 2016
Источник: debian
EPSS Низкий

Описание

The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat9not-affectedpackage
tomcat8fixed8.0.32-1package
tomcat7fixed7.0.68-1package
tomcat6fixed6.0.41-3package

Примечания

  • Since 6.0.41-3, src:tomcat6 only builds a servlet and docs

  • Fixed in 7.0.68, 8.0.32, 9.0.0.M3

  • Upstream advisory does not make reference to 6.x but looking at the

  • upstream patches reveals that this issue is fixed since 6.0.45

  • http://svn.apache.org/viewvc?view=revision&revision=1720661

  • http://svn.apache.org/viewvc?view=revision&revision=1720663

EPSS

Процентиль: 84%
0.02344
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 9 лет назад

The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.

CVSS3: 8.8
redhat
больше 9 лет назад

The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.

CVSS3: 8.8
nvd
больше 9 лет назад

The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.

CVSS3: 8.8
github
около 3 лет назад

Apache Tomcat allows remote attackers to bypass a CSRF protection mechanism by using a token

fstec
больше 9 лет назад

Уязвимость сервера приложений Apache Tomcat, позволяющая нарушителю обойти механизм защиты CSRF

EPSS

Процентиль: 84%
0.02344
Низкий