logo

CVE-2022-23181 org.apache.tomcat:tomcat

Package

Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=10.0.0 <10.0.16 || >=9.0.0 <9.0.58 || >=0 <8.5.75

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00258 pctl0.49017

Details

Race condition in Apache Tomcat The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.

Metadata

Created: 2022-02-01T00:45:44Z
Modified: 2022-04-19T15:24:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-9f3j-pm6f-9fm5/GHSA-9f3j-pm6f-9fm5.json
CWE IDs: ["CWE-367"]
Alternative ID: GHSA-9f3j-pm6f-9fm5
Finding: F124
Auto approve: 1