CVE-2011-2526 – org.apache.tomcat:tomcat
Package
Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=0 <5.5.34 || >=6.0.0 <6.0.33 || >=7.0.0 <7.0.19
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0013 pctl0.33234
Details
Improper Input Validation in Apache Tomcat Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
Metadata
Created: 2022-05-14T01:17:03Z
Modified: 2024-02-21T21:49:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-9ggm-7897-x4mg/GHSA-9ggm-7897-x4mg.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-9ggm-7897-x4mg
Finding: F184
Auto approve: 1