CVE-2011-4858 – org.apache.tomcat:tomcat
Package
Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=5.5.0 <5.5.35 || >=6.0.0 <6.0.35 || >=7.0.0 <7.0.23
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.73855 pctl0.98774
Details
Improper Input Validation in Apache Tomcat Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Metadata
Created: 2022-05-14T03:52:45Z
Modified: 2022-07-13T18:25:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wr3m-gw98-mc3j/GHSA-wr3m-gw98-mc3j.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-wr3m-gw98-mc3j
Finding: F184
Auto approve: 1