6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.002 Low
EPSS
Percentile
64.6%
Apache tomcat is vulnerable to Open Redirect Vulnerability. The vulnerability arises due to not validating/sanitizing the request uri used to redirect a user back to the original page after a successful form submission. The attacker can redirect a user to any malicious crafted url leading to open redirect vulnerability.
github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
lists.debian.org/debian-lts-announce/2023/10/msg00020.html
security.netapp.com/advisory/ntap-20230921-0006/
www.debian.org/security/2023/dsa-5521
www.debian.org/security/2023/dsa-5522