Lucene search

K
githubGitHub Advisory DatabaseGHSA-9GGM-7897-X4MG
HistoryMay 14, 2022 - 1:17 a.m.

Improper Input Validation in Apache Tomcat

2022-05-1401:17:03
CWE-20
GitHub Advisory Database
github.com
16
apache tomcat
input validation
http connector
file access
denial of service

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

17.0%

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.

Affected configurations

Vulners
Node
org.apache.tomcattomcatRange7.0.0โ€“7.0.19
OR
org.apache.tomcattomcatRange6.0.0โ€“6.0.33
OR
org.apache.tomcattomcatRange<5.5.34
VendorProductVersionCPE
org.apache.tomcattomcat*cpe:2.3:a:org.apache.tomcat:tomcat:*:*:*:*:*:*:*:*

References

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

17.0%