Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jc7p-5r39-9477

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

Improper Input Validation in Apache Tomcat

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat-coyote

maven
Затронутые версииВерсия исправления

>= 9.0.0.M1, <= 9.0.0.M11

9.0.0.M12

Наименование

org.apache.tomcat:tomcat-coyote

maven
Затронутые версииВерсия исправления

>= 8.5.0, < 8.5.8

8.5.8

Наименование

org.apache.tomcat:tomcat-coyote

maven
Затронутые версииВерсия исправления

>= 8.0.0RC1, < 8.0.39

8.0.39

Наименование

org.apache.tomcat:tomcat-coyote

maven
Затронутые версииВерсия исправления

>= 7.0.0, < 7.0.73

7.0.73

Наименование

org.apache.tomcat:tomcat-coyote

maven
Затронутые версииВерсия исправления

>= 6.0.0, < 6.0.48

6.0.48

EPSS

Процентиль: 88%
0.03837
Низкий

7.1 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.1
ubuntu
почти 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 6.5
redhat
около 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
nvd
почти 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
debian
почти 9 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0 ...

oracle-oval
почти 9 лет назад

ELSA-2017-0935: tomcat security update (MODERATE)

EPSS

Процентиль: 88%
0.03837
Низкий

7.1 High

CVSS3

Дефекты

CWE-20