7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
0.029 Low
EPSS
Percentile
90.8%
Issue Overview:
A flaw was found in the tomcat package. When a web application sends a WebSocket message concurrently with the WebSocket connection closing, the application may continue to use the socket after it has been closed. In this case, the error handling triggered could cause the pooled object to be placed in the pool twice. This issue results in subsequent connections using the same object concurrently, which causes data to be potentially returned to the wrong user or application stability issues. (CVE-2022-25762)
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks. (CVE-2022-29885)
Affected Packages:
tomcat8
Issue Correction:
Run yum update tomcat8 to update your system.
New Packages:
noarch:
tomcat8-jsp-2.3-api-8.5.81-1.91.amzn1.noarch
tomcat8-javadoc-8.5.81-1.91.amzn1.noarch
tomcat8-lib-8.5.81-1.91.amzn1.noarch
tomcat8-webapps-8.5.81-1.91.amzn1.noarch
tomcat8-8.5.81-1.91.amzn1.noarch
tomcat8-el-3.0-api-8.5.81-1.91.amzn1.noarch
tomcat8-log4j-8.5.81-1.91.amzn1.noarch
tomcat8-docs-webapp-8.5.81-1.91.amzn1.noarch
tomcat8-servlet-3.1-api-8.5.81-1.91.amzn1.noarch
tomcat8-admin-webapps-8.5.81-1.91.amzn1.noarch
src:
tomcat8-8.5.81-1.91.amzn1.src
Red Hat: CVE-2022-25762, CVE-2022-29885
Mitre: CVE-2022-25762, CVE-2022-29885
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
0.029 Low
EPSS
Percentile
90.8%