Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rp8h-vr48-4j8p

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Apache Tomcat Exposes IP Addresses and HTTP Headers of Requests

Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 6.0.30, <= 6.0.33

6.0.35

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 7.0, < 7.0.22

7.0.22

EPSS

Процентиль: 83%
0.02015
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 13 лет назад

Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.

redhat
больше 13 лет назад

Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.

nvd
больше 13 лет назад

Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.

debian
больше 13 лет назад

Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not pro ...

EPSS

Процентиль: 83%
0.02015
Низкий

Дефекты

CWE-200