CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
65.1%
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | tomcat | 6.0.30 | cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:* |
apache | tomcat | 6.0.31 | cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:* |
apache | tomcat | 6.0.32 | cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:* |
apache | tomcat | 6.0.33 | cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:* |
apache | tomcat | 7.0.0 | cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* |
apache | tomcat | 7.0.1 | cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* |
apache | tomcat | 7.0.2 | cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* |
apache | tomcat | 7.0.3 | cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* |
apache | tomcat | 7.0.4 | cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:* |
apache | tomcat | 7.0.5 | cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:* |