CVE-2022-23181 – org.apache.tomcat:tomcat
Package
Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=10.0.0 <10.0.16 || >=9.0.0 <9.0.58 || >=0 <8.5.75
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00258 pctl0.49017
Details
Race condition in Apache Tomcat The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
Metadata
Created: 2022-02-01T00:45:44Z
Modified: 2022-04-19T15:24:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-9f3j-pm6f-9fm5/GHSA-9f3j-pm6f-9fm5.json
CWE IDs: ["CWE-367"]
Alternative ID: GHSA-9f3j-pm6f-9fm5
Finding: F124
Auto approve: 1