logo

CVE-2011-2526 org.apache.tomcat:tomcat

Package

Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=0 <5.5.34 || >=6.0.0 <6.0.33 || >=7.0.0 <7.0.19

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0013 pctl0.33234

Details

Improper Input Validation in Apache Tomcat Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.

Metadata

Created: 2022-05-14T01:17:03Z
Modified: 2024-02-21T21:49:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9ggm-7897-x4mg/GHSA-9ggm-7897-x4mg.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-9ggm-7897-x4mg
Finding: F184
Auto approve: 1