logo

CVE-2016-5018 org.apache.tomcat.embed:tomcat-embed-jasper

Package

Manager: maven
Name: org.apache.tomcat.embed:tomcat-embed-jasper
Vulnerable Version: >=9.0.0.m1 <9.0.0.m10 || >=8.5.0 <8.5.5 || >=8.0.0rc1 <8.0.37 || >=7.0.0 <7.0.72 || >=6.0.0 <6.0.47

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00907 pctl0.74888

Details

Authentication Bypass Using an Alternate Path or Channel in Apache Tomcat In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.

Metadata

Created: 2022-05-13T01:02:15Z
Modified: 2024-04-18T17:05:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4v3g-g84w-hv7r/GHSA-4v3g-g84w-hv7r.json
CWE IDs: ["CWE-288"]
Alternative ID: GHSA-4v3g-g84w-hv7r
Finding: F115
Auto approve: 1