Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-2526

Опубликовано: 13 июл. 2011
Источник: redhat
CVSS2: 2.6
EPSS Низкий

Описание

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.

Отчет

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certificate System 7.3OtherNot affected
Red Hat Developer Suite v.3PlatformNot affected
Red Hat Enterprise Linux 5tomcat5Not affected
Red Hat Satellite 5.4ServerNot affected
JBEWP 5 for RHEL 5jbosswebFixedRHSA-2012:007631.01.2012
JBEWP 5 for RHEL 6jbosswebFixedRHSA-2012:007631.01.2012
JBoss Communications Platform 5.1FixedRHSA-2012:007831.01.2012
JBoss Enterprise BRMS Platform 5.1FixedRHSA-2012:032522.02.2012
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2011:178005.12.2011
Red Hat JBoss Enterprise Application Platform 4.3FixedRHSA-2012:004119.01.2012

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=720948tomcat: security manager restrictions bypass

EPSS

Процентиль: 34%
0.0013
Низкий

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
почти 14 лет назад

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.

nvd
почти 14 лет назад

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.

debian
почти 14 лет назад

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7 ...

github
около 3 лет назад

Improper Input Validation in Apache Tomcat

oracle-oval
больше 13 лет назад

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)

EPSS

Процентиль: 34%
0.0013
Низкий

2.6 Low

CVSS2