Description: | Summary: Apache Tomcat is prone to security bypass and information disclosure vulnerabilities.
Vulnerability Insight: Multiple flaws exist due to:
- An error in the system property replacement feature for configuration files.
- An error in the realm implementations in Apache Tomcat that does not process the supplied password if the supplied user name did not exist.
- An error in the configured SecurityManager via a Tomcat utility method that is accessible to web applications.
- An error in the configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
- An error in the ResourceLinkFactory implementation in Apache Tomcat that does not limit web application access to global JNDI resources to those resources explicitly linked to the web application.
Vulnerability Impact: Successful exploitation will allow remote attackers to gain access to potentially sensitive information and bypass certain security restrictions.
Affected Software/OS: Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, Apache Tomcat versions 8.5.0 to 8.5.4, Apache Tomcat versions 8.0.0.RC1 to 8.0.36, Apache Tomcat versions 7.0.0 to 7.0.70, and Apache Tomcat versions 6.0.0 to 6.0.45 on Linux.
Solution: Upgrade to Apache Tomcat version 9.0.0.M10 or 8.5.5 or 8.0.37 or 7.0.72 or 6.0.47 or later.
CVSS Score: 6.4
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
|