[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2TOMCAT8.5-2023-009 --- tomcat

ID: oval:org.secpod.oval:def:1701732Date: (C)2023-10-26   (M)2023-12-20
Class: PATCHFamily: unix




A deserialization flaw was discovered in Apache Tomcat's use of a FileStore. Under specific circumstances, an attacker can use a specially crafted request to trigger Remote Code Execution through deserialization of the file under their control. The highest threat from the vulnerability is to data confidentiality and integrity as well as system availability. A flaw was found in Apache Tomcat. When responding to new h2c connection requests, Apache Tomcat could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. The highest threat from this vulnerability is to data confidentiality. The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue

Platform:
Amazon Linux 2
Product:
tomcat
Reference:
ALAS2TOMCAT8.5-2023-009
CVE-2020-9484
CVE-2021-25122
CVE-2021-25329
CVE    3
CVE-2021-25329
CVE-2021-25122
CVE-2020-9484
CPE    6
cpe:/a:apache:tomcat:10.0.0:milestone2
cpe:/o:amazon:linux:2
cpe:/a:apache:tomcat:10.0.0:milestone1
cpe:/a:apache:tomcat
...

© SecPod Technologies