CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
79.4%
CentOS Errata and Security Advisory CESA-2017:0935
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2017-April/084546.html
Affected packages:
tomcat
tomcat-admin-webapps
tomcat-docs-webapp
tomcat-el-2.2-api
tomcat-javadoc
tomcat-jsp-2.2-api
tomcat-jsvc
tomcat-lib
tomcat-servlet-3.0-api
tomcat-webapps
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:0935
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | noarch | tomcat | < 7.0.69-11.el7_3 | tomcat-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-admin-webapps | < 7.0.69-11.el7_3 | tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-docs-webapp | < 7.0.69-11.el7_3 | tomcat-docs-webapp-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-el-2.2-api | < 7.0.69-11.el7_3 | tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-javadoc | < 7.0.69-11.el7_3 | tomcat-javadoc-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-jsp-2.2-api | < 7.0.69-11.el7_3 | tomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-jsvc | < 7.0.69-11.el7_3 | tomcat-jsvc-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-lib | < 7.0.69-11.el7_3 | tomcat-lib-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-servlet-3.0-api | < 7.0.69-11.el7_3 | tomcat-servlet-3.0-api-7.0.69-11.el7_3.noarch.rpm |
CentOS | 7 | noarch | tomcat-webapps | < 7.0.69-11.el7_3 | tomcat-webapps-7.0.69-11.el7_3.noarch.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
79.4%