CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
75.7%
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
Vendor | Product | Version | CPE |
---|---|---|---|
org.apache.tomcat | tomcat | * | cpe:2.3:a:org.apache.tomcat:tomcat:*:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
marc.info/?l=bugtraq&m=139344343412337&w=2
security.gentoo.org/glsa/glsa-200804-10.xml
support.apple.com/kb/HT3216
tomcat.apache.org/security-6.html
www.vmware.com/security/advisories/VMSA-2009-0016.html
github.com/advisories/GHSA-5x5f-9r6q-q7mh
nvd.nist.gov/vuln/detail/CVE-2008-0002
web.archive.org/web/20080214133036/secunia.com/advisories/28915
web.archive.org/web/20080715062302/secunia.com/advisories/29711
web.archive.org/web/20080724052339/secunia.com/advisories/28834
web.archive.org/web/20081012021650/www.securityfocus.com/bid/27703
web.archive.org/web/20081013050642/secunia.com/advisories/32222
web.archive.org/web/20081120062646/securityreason.com/securityalert/3638
web.archive.org/web/20081121133027/www.securityfocus.com/archive/1/487812/100/0/threaded
web.archive.org/web/20091125140215/secunia.com/advisories/37460
web.archive.org/web/20120825080137/www.securityfocus.com/bid/31681
web.archive.org/web/20140723000733/secunia.com/advisories/57126
web.archive.org/web/20150621204350/www.securityfocus.com/archive/1/507985/100/0/threaded
www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html