[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2017-873 ---- tomcat7

ID: oval:org.secpod.oval:def:1600750Date: (C)2020-11-27   (M)2023-12-20
Class: PATCHFamily: unix




Security constrained bypass in error page mechanism:While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.Calls to application listeners did not use the appropriate facade object:A vulnerability was discovered in tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application

Platform:
Amazon Linux AMI
Product:
tomcat7
Reference:
ALAS-2017-873
CVE-2017-5664
CVE-2017-5648
CVE-2017-7674
CVE    3
CVE-2017-5664
CVE-2017-5648
CVE-2017-7674
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:tomcat7

© SecPod Technologies