[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5521-1 tomcat10 -- tomcat10

ID: oval:org.secpod.oval:def:95375Date: (C)2023-12-05   (M)2024-05-09
Class: PATCHFamily: unix




Several security vulnerabilities have been discovered in the Tomcat servlet and JSP engine. CVE-2023-28709 Denial of Service. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. CVE-2023-41080 Open redirect. If the ROOT web application is configured to use FORM authentication then it is possible that a specially crafted URL could be used to trigger a redirect to an URL of the attackers choice. CVE-2023-42795 Information Disclosure. When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. CVE-2023-44487 DoS caused by HTTP/2 frame overhead CVE-2023-45648 Request smuggling. Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy.

Platform:
Linux Mint 6
Product:
libtomcat10-java
libtomcat10-embed-java
tomcat10
Reference:
DSA-5521-1
CVE-2023-28709
CVE-2023-41080
CVE-2023-42795
CVE-2023-44487
CVE-2023-45648
CVE    5
CVE-2023-28709
CVE-2023-41080
CVE-2023-42795
CVE-2023-45648
...

© SecPod Technologies