[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2TOMCAT8.5-2023-005 --- tomcat

ID: oval:org.secpod.oval:def:1701687Date: (C)2023-10-26   (M)2023-10-26
Class: PATCHFamily: unix




A flaw was found in Spring Framework, specifically within two modules called Spring MVC and Spring WebFlux, , using parameter data binding. This flaw allows an attacker to pass specially-constructed malicious requests to certain parameters and possibly gain access to normally-restricted functionality within the Java Virtual Machine. The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks

Platform:
Amazon Linux 2
Product:
tomcat
Reference:
ALAS2TOMCAT8.5-2023-005
CVE-2022-22965
CVE-2022-29885
CVE    2
CVE-2022-22965
CVE-2022-29885
CPE    2
cpe:/o:amazon:linux:2
cpe:/a:apache:tomcat

© SecPod Technologies