Lucene search

K
tomcatApache TomcatTOMCAT:B34608AC39E41A48C158DAC3326F86C0
HistoryFeb 04, 2015 - 12:00 a.m.

Fixed in Apache Tomcat 7.0.59

2015-02-0400:00:00
Apache Tomcat
tomcat.apache.org
25

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

69.3%

Note: The issue below was fixed in Apache Tomcat 7.0.58 but the release vote for the 7.0.58 release candidate did not pass. Therefore, although users must download 7.0.59 to obtain a version that includes a fix for this issue, versions 7.0.58 is not included in the list of affected versions.

Moderate: Security Manager bypass CVE-2014-7810

Malicious web applications could use expression language to bypass the protections of a Security Manager as expressions were evaluated within a privileged code section.

This was fixed in revisions 1644019 and 1645644.

This issue was identified by the Tomcat security team on 2 November 2014 and made public on 14 May 2015.

Affects: 7.0.0 to 7.0.57

CPENameOperatorVersion
apache tomcatge7.0.0
apache tomcatle7.0.57

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

69.3%