logo

CVE-2022-25762 org.apache.tomcat:tomcat

Package

Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=8.5.0 <8.5.75 || >=9.0.0m1 <9.0.20

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.0035 pctl0.56772

Details

Improper socket reuse in Apache Tomcat If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.

Metadata

Created: 2022-05-14T00:01:50Z
Modified: 2022-05-25T22:52:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h3ch-5pp2-vh6w/GHSA-h3ch-5pp2-vh6w.json
CWE IDs: ["CWE-404"]
Alternative ID: GHSA-h3ch-5pp2-vh6w
Finding: F108
Auto approve: 1