| Name |
Description |
| CVE-2017-7683 |
Apache OpenMeetings 1.0.0 displays Tomcat version and detailed error
stack trace, which is not secure.
|
| CVE-2017-7675 |
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and
8.5.0 to 8.5.15 bypassed a number of security checks that prevented
directory traversal attacks. It was therefore possible to bypass
security constraints using a specially crafted URL.
|
| CVE-2017-7674 |
The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to
8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP
Vary header indicating that the response varies depending on Origin.
This permitted client and server side cache poisoning in some
circumstances.
|
| CVE-2017-7428 |
NetIQ iManager 3.x before 3.0.3.1 has an issue in the renegotiation of
connection parameters with Tomcat.
|
| CVE-2017-6712 |
A vulnerability in certain commands of Cisco Elastic Services
Controller could allow an authenticated, remote attacker to elevate
privileges to root and run dangerous commands on the server. The
vulnerability occurs because a "tomcat" user on the system can run
certain shell commands, allowing the user to overwrite any file on the
filesystem and elevate privileges to root. This vulnerability affects
Cisco Elastic Services Controller prior to releases 2.3.1.434 and
2.3.2. Cisco Bug IDs: CSCvc76634.
|
| CVE-2017-6683 |
A vulnerability in the esc_listener.py script of Cisco Elastic Services
Controllers could allow an authenticated, remote attacker to execute
arbitrary commands as the tomcat user on an affected system, aka an
Authentication Request Processing Arbitrary Command Execution
Vulnerability. More Information: CSCvc76642. Known Affected Releases:
2.2(9.76).
|
| CVE-2017-6682 |
A vulnerability in the ConfD CLI of Cisco Elastic Services Controllers
could allow an authenticated, remote attacker to run arbitrary commands
as the Linux tomcat user on an affected system. More Information:
CSCvc76620. Known Affected Releases: 2.2(9.76).
|
| CVE-2017-6056 |
It was discovered that a programming error in the processing of HTTPS
requests in the Apache Tomcat servlet and JSP engine may result in
denial of service via an infinite loop. The denial of service is easily
achievable as a consequence of backporting a CVE-2016-6816 fix but not
backporting the fix for Tomcat bug 57544. Distributions affected by
this backporting issue include Debian (before 7.0.56-3+deb8u8 and
8.0.14-1+deb8u7 in jessie) and Ubuntu.
|
| CVE-2017-5664 |
The error page mechanism of the Java Servlet Specification requires
that, when an error occurs and an error page is configured for the
error that occurred, the original request and response are forwarded
to the error page. This means that the request is presented to the
error page with the original HTTP method. If the error page is a
static file, expected behaviour is to serve content of the file as if
processing a GET request, regardless of the actual HTTP method. The
Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to
8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this.
Depending on the original request this could lead to unexpected and
undesirable results for static error pages including, if the
DefaultServlet is configured to permit writes, the replacement or
removal of the custom error page. Notes for other user provided error
pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP
method. JSPs used as error pages must must ensure that they handle
any error dispatch as a GET request, regardless of the actual method.
(2) By default, the response generated by a Servlet does depend on
the HTTP method. Custom Servlets used as error pages must ensure
that they handle any error dispatch as a GET request, regardless of
the actual method.
|
| CVE-2017-5651 |
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the
refactoring of the HTTP connectors introduced a regression in the send
file processing. If the send file processing completed quickly, it was
possible for the Processor to be added to the processor cache twice.
This could result in the same Processor being used for multiple
requests which in turn could lead to unexpected errors and/or response
mix-up.
|
| CVE-2017-5650 |
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the
handling of an HTTP/2 GOAWAY frame for a connection did not close
streams associated with that connection that were currently waiting
for a WINDOW_UPDATE before allowing the application to write more
data. These waiting streams each consumed a thread. A malicious client
could therefore construct a series of HTTP/2 requests that would
consume all available processing threads.
|
| CVE-2017-5648 |
While investigating bug 60718, it was noticed that some calls to
application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to
8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the
appropriate facade object. When running an untrusted application under
a SecurityManager, it was therefore possible for that untrusted
application to retain a reference to the request or response object
and thereby access and/or modify information associated with another
web application.
|
| CVE-2017-5647 |
A bug in the handling of the pipelined requests in Apache Tomcat
9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to
7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the
pipelined request being lost when send file processing of the previous
request completed. This could result in responses appearing to be sent
for the wrong request. For example, a user agent that sent requests A,
B and C could see the correct response for request A, the response for
request C for request B and no response for request C.
|
| CVE-2017-14105 |
HiveManager Classic through 8.1r1 allows arbitrary JSP code execution
by modifying a backup archive before a restore, because the restore
feature does not validate pathnames within the archive. An
authenticated, local attacker - even restricted as a tenant - can add a
jsp at HiveManager/tomcat/webapps/hm/domains/$yourtenant/maps (it will
be exposed at the web interface).
|
| CVE-2017-13990 |
An information leakage vulnerability in ArcSight ESM and ArcSight ESM
Express, any 6.x version prior to 6.9.1c Patch 4 or 6.11.0 Patch 1,
allows disclosure of Apache Tomcat application server version.
|
| CVE-2017-12617 |
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to
8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled
(e.g. via setting the readonly initialisation parameter of the Default
servlet to false) it was possible to upload a JSP file to the server
via a specially crafted request. This JSP could then be requested and
any code it contained would be executed by the server.
|
| CVE-2017-12616 |
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it
was possible to bypass security constraints and/or view the source
code of JSPs for resources served by the VirtualDirContext using a
specially crafted request.
|
| CVE-2017-12615 |
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs
enabled (e.g. via setting the readonly initialisation parameter of the
Default to false) it was possible to upload a JSP file to the server
via a specially crafted request. This JSP could then be requested and
any code it contained would be executed by the server.
|
| CVE-2016-9879 |
An issue was discovered in Pivotal Spring Security before 3.2.10, 4.1.x
before 4.1.4, and 4.2.x before 4.2.1. Spring Security does not consider
URL path parameters when processing security constraints. By adding a
URL path parameter with an encoded "/" to a request, an attacker may be
able to bypass a security constraint. The root cause of this issue is a
lack of clarity regarding the handling of path parameters in the
Servlet Specification. Some Servlet containers include path parameters
in the value returned for getPathInfo() and some do not. Spring
Security uses the value returned by getPathInfo() as part of the
process of mapping requests to security constraints. The unexpected
presence of path parameters can cause a constraint to be bypassed.
Users of Apache Tomcat (all current versions) are not affected by this
vulnerability since Tomcat follows the guidance previously provided by
the Servlet Expert group and strips path parameters from the value
returned by getContextPath(), getServletPath(), and getPathInfo().
Users of other Servlet containers based on Apache Tomcat may or may not
be affected depending on whether or not the handling of path parameters
has been modified. Users of IBM WebSphere Application Server 8.5.x are
known to be affected. Users of other containers that implement the
Servlet specification may be affected.
|
| CVE-2016-9775 |
The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3
on Debian wheezy, before 6.0.45+dfsg-1~deb8u1 on Debian jessie, before
6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on Ubuntu 14.04 LTS; the
tomcat7 package before 7.0.28-4+deb7u7 on Debian wheezy, before
7.0.56-3+deb8u6 on Debian jessie, before 7.0.52-1ubuntu0.8 on Ubuntu
14.04 LTS, and on Ubuntu 12.04 LTS, 16.04 LTS, and 16.10; and the
tomcat8 package before 8.0.14-1+deb8u5 on Debian jessie, before
8.0.32-1ubuntu1.3 on Ubuntu 16.04 LTS, before 8.0.37-1ubuntu0.1 on
Ubuntu 16.10, and before 8.0.38-2ubuntu1 on Ubuntu 17.04 might allow
local users with access to the tomcat account to gain root privileges
via a setgid program in the Catalina directory, as demonstrated by
/etc/tomcat8/Catalina/attack.
|
| CVE-2016-9774 |
The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4
on Debian wheezy, before 6.0.35-1ubuntu3.9 on Ubuntu 12.04 LTS and on
Ubuntu 14.04 LTS; the tomcat7 package before 7.0.28-4+deb7u8 on Debian
wheezy, before 7.0.56-3+deb8u6 on Debian jessie, before
7.0.52-1ubuntu0.8 on Ubuntu 14.04 LTS, and on Ubuntu 12.04 LTS, 16.04
LTS, and 16.10; and the tomcat8 package before 8.0.14-1+deb8u5 on
Debian jessie, before 8.0.32-1ubuntu1.3 on Ubuntu 16.04 LTS, before
8.0.37-1ubuntu0.1 on Ubuntu 16.10, and before 8.0.38-2ubuntu1 on
Ubuntu 17.04 might allow local users with access to the tomcat account
to obtain sensitive information or gain root privileges via a symlink
attack on the Catalina localhost directory.
|
| CVE-2016-8747 |
An information disclosure issue was discovered in Apache Tomcat 8.5.7
to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations.
Http11InputBuffer.java allows remote attackers to read data that was
intended to be associated with a different request.
|
| CVE-2016-8745 |
A bug in the error handling of the send file code for the NIO HTTP
connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8,
8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in
the current Processor object being added to the Processor cache
multiple times. This in turn meant that the same Processor could be
used for concurrent requests. Sharing a Processor can result in
information leakage between requests including, not not limited to,
session ID and the response body. The bug was first noticed in 8.5.x
onwards where it appears the refactoring of the Connector code for
8.5.x onwards made it more likely that the bug was observed. Initially
it was thought that the 8.5.x refactoring introduced the bug but
further investigation has shown that the bug is present in all
currently supported Tomcat versions.
|
| CVE-2016-8735 |
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x
before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before
9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can
reach JMX ports. The issue exists because this listener wasn't updated
for consistency with the CVE-2016-3427 Oracle patch that affected
credential types.
|
| CVE-2016-6817 |
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and
8.5.0 to 8.5.6 entered an infinite loop if a header was received that
was larger than the available buffer. This made a denial of service
attack possible.
|
| CVE-2016-6816 |
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6,
8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed
the HTTP request line permitted invalid characters. This could be
exploited, in conjunction with a proxy that also permitted the invalid
characters but with a different interpretation, to inject data into
the HTTP response. By manipulating the HTTP response the attacker
could poison a web-cache, perform an XSS attack and/or obtain
sensitive information from requests other then their own.
|
| CVE-2016-6808 |
Buffer overflow in Apache Tomcat Connectors (mod_jk) before 1.2.42.
|
| CVE-2016-6797 |
The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to
9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and
6.0.0 to 6.0.45 did not limit web application access to global JNDI
resources to those resources explicitly linked to the web application.
Therefore, it was possible for a web application to access any global
JNDI resource whether an explicit ResourceLink had been configured or
not.
|
| CVE-2016-6796 |
A malicious web application running on Apache Tomcat 9.0.0.M1 to
9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and
6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via
manipulation of the configuration parameters for the JSP Servlet.
|
| CVE-2016-6794 |
When a SecurityManager is configured, a web application's ability to
read system properties should be controlled by the SecurityManager. In
Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to
8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property
replacement feature for configuration files could be used by a
malicious web application to bypass the SecurityManager and read
system properties that should not be visible.
|
| CVE-2016-6325 |
The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7,
JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1)
/etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows
local users to gain privileges by leveraging membership in the tomcat
group.
|
| CVE-2016-5526 |
Unspecified vulnerability in the Oracle Agile PLM component in Oracle
Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to
affect confidentiality, integrity, and availability via vectors
related to Apache Tomcat.
|
| CVE-2016-5425 |
The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora,
CentOS, Oracle Linux, and possibly other Linux distributions uses weak
permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local
users to gain root privileges by leveraging membership in the tomcat
group.
|
| CVE-2016-5388 |
Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows
RFC 3875 section 4.1.18 and therefore does not protect applications
from the presence of untrusted client data in the HTTP_PROXY
environment variable, which might allow remote attackers to redirect
an application's outbound HTTP traffic to an arbitrary proxy server
via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
NOTE: the vendor states "A mitigation is planned for future releases
of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a
CVE ID for a vulnerability.
|
| CVE-2016-5018 |
In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to
8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web
application was able to bypass a configured SecurityManager via a
Tomcat utility method that was accessible to web applications.
|
| CVE-2016-3092 |
The MultipartStream class in Apache Commons Fileupload before 1.3.2,
as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x
before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows
remote attackers to cause a denial of service (CPU consumption) via a
long boundary string.
|
| CVE-2016-2961 |
The integration server in IBM Integration Bus 9 before 9.0.0.6 and 10
before 10.0.0.5 and WebSphere Message Broker 8 before 8.0.0.8 allows
remote attackers to obtain sensitive Tomcat version information by
sending a malformed POST request and then reading the Java stack
trace.
|
| CVE-2016-1593 |
Directory traversal vulnerability in the import users feature in Micro
Focus Novell Service Desk before 7.2 allows remote authenticated
administrators to upload and execute arbitrary JSP files via a .. (dot
dot) in a filename within a multipart/form-data POST request to a
LiveTime.woa URL.
|
| CVE-2016-1240 |
The Tomcat init script in the tomcat7 package before 7.0.56-3+deb8u4
and tomcat8 package before 8.0.14-1+deb8u3 on Debian jessie and the
tomcat6 and libtomcat6-java packages before 6.0.35-1ubuntu3.8 on
Ubuntu 12.04 LTS, the tomcat7 and libtomcat7-java packages before
7.0.52-1ubuntu0.7 on Ubuntu 14.04 LTS, and tomcat8 and libtomcat8-java
packages before 8.0.32-1ubuntu1.2 on Ubuntu 16.04 LTS allows local
users with access to the tomcat account to gain root privileges via a
symlink attack on the Catalina log file, as demonstrated by
/var/log/tomcat7/catalina.out.
|
| CVE-2016-0763 |
The setGlobalContext method in
org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat
7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not
consider whether ResourceLinkFactory.setGlobalContext callers are
authorized, which allows remote authenticated users to bypass intended
SecurityManager restrictions and read or write to arbitrary
application data, or cause a denial of service (application
disruption), via a web application that sets a crafted global context.
|
| CVE-2016-0762 |
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to
9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and
6.0.0 to 6.0.45 did not process the supplied password if the supplied
user name did not exist. This made a timing attack possible to
determine valid user names. Note that the default configuration
includes the LockOutRealm which makes exploitation of this
vulnerability harder.
|
| CVE-2016-0714 |
The session-persistence implementation in Apache Tomcat 6.x before
6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2
mishandles session attributes, which allows remote authenticated users
to bypass intended SecurityManager restrictions and execute arbitrary
code in a privileged context via a web application that places a
crafted object in a session.
|
| CVE-2016-0706 |
Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31,
and 9.x before 9.0.0.M2 does not place
org.apache.catalina.manager.StatusManagerServlet on the
org/apache/catalina/core/RestrictedServlets.properties list, which
allows remote authenticated users to bypass intended SecurityManager
restrictions and read arbitrary HTTP requests, and consequently
discover session ID values, via a crafted web application.
|
| CVE-2015-5351 |
The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x
before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish
sessions and send CSRF tokens for arbitrary new requests, which allows
remote attackers to bypass a CSRF protection mechanism by using a
token.
|
| CVE-2015-5346 |
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x
before 8.0.30, and 9.x before 9.0.0.M2, when different session
settings are used for deployments of multiple versions of the same web
application, might allow remote attackers to hijack web sessions by
leveraging use of a requestedSessionSSL field for an unintended
request, related to CoyoteAdapter.java and Request.java.
|
| CVE-2015-5345 |
The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before
7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects
before considering security constraints and Filters, which allows
remote attackers to determine the existence of a directory via a URL
that lacks a trailing / (slash) character.
|
| CVE-2015-5174 |
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat
6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows
remote authenticated users to bypass intended SecurityManager
restrictions and list a parent directory via a /.. (slash dot dot) in
a pathname used by a web application in a getResource,
getResourceAsStream, or getResourcePaths call, as demonstrated by the
$CATALINA_BASE/webapps directory.
|
| CVE-2015-4269 |
The Tomcat throttling feature in Cisco Unified Communications Manager
10.5(1.99995.9) allows remote authenticated users to cause a denial of
service (management outage) by sending many requests, aka Bug ID
CSCuu99709.
|
| CVE-2015-3158 |
The invokeNextValve function in
identity/federation/bindings/tomcat/idp/AbstractIDPValve.java in
PicketLink before 2.8.0.Beta1 does not properly check role based
authorization, which allows remote authenticated users to gain access
to restricted application resources via a (1) direct request or (2)
request through an SP initiated flow.
|
| CVE-2015-0779 |
Directory traversal vulnerability in UploadServlet in Novell ZENworks
Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote
attackers to execute arbitrary code via a crafted directory name in
the uid parameter, in conjunction with a WAR filename in the filename
parameter and WAR content in the POST data, a different vulnerability
than CVE-2010-5323 and CVE-2010-5324.
|
| CVE-2014-9635 |
Jenkins before 1.586 does not set the HttpOnly flag in a Set-Cookie
header for session cookies when run on Tomcat 7.0.41 or later, which
makes it easier for remote attackers to obtain potentially sensitive
information via script access to cookies.
|
| CVE-2014-9634 |
Jenkins before 1.586 does not set the secure flag on session cookies
when run on Tomcat 7.0.41 or later, which makes it easier for remote
attackers to capture cookies by intercepting their transmission within
an HTTP session.
|
| CVE-2014-8111 |
Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount
rules for subtrees of previous JkMount rules, which allows remote
attackers to access otherwise restricted artifacts via unspecified
vectors.
|
| CVE-2014-7810 |
The Expression Language (EL) implementation in Apache Tomcat 6.x
before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not
properly consider the possibility of an accessible interface
implemented by an inaccessible class, which allows attackers to bypass
a SecurityManager protection mechanism via a web application that
leverages use of incorrect privileges during EL evaluation.
|
| CVE-2014-2130 |
Cisco Secure Access Control Server (ACS) provides an unintentional
administration web interface based on Apache Tomcat, which allows
remote authenticated users to modify application files and
configuration files, and consequently execute arbitrary code, by
leveraging administrative privileges, aka Bug ID CSCuj83189.
|
| CVE-2014-0871 |
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before
4.7.0.03 FP5 in IBM Algorithmics allows remote attackers to obtain
potentially sensitive Tomcat stack-trace information via non-printing
characters in a cookie to the /classes/ URI, as demonstrated by the
\x00 character.
|
| CVE-2014-0230 |
Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before
8.0.9 does not properly handle cases where an HTTP response occurs
before finishing the reading of an entire request body, which allows
remote attackers to cause a denial of service (thread consumption) via
a series of aborted upload attempts.
|
| CVE-2014-0227 |
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in
Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before
8.0.9 does not properly handle attempts to continue reading data after
an error has occurred, which allows remote attackers to conduct HTTP
request smuggling attacks or cause a denial of service (resource
consumption) by streaming data with malformed chunked transfer coding.
|
| CVE-2014-0186 |
A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise
Linux (RHEL) 7 allows remote attackers to cause a denial of service
(CPU consumption) via a crafted request. NOTE: this vulnerability
exists because of an unspecified regression.
|
| CVE-2014-0119 |
Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6
does not properly constrain the class loader that accesses the XML
parser used with an XSLT stylesheet, which allows remote attackers to
(1) read arbitrary files via a crafted web application that provides
an XML external entity declaration in conjunction with an entity
reference, related to an XML External Entity (XXE) issue, or (2) read
files associated with different web applications on a single Tomcat
instance via a crafted web application.
|
| CVE-2014-0099 |
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in
Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4,
when operated behind a reverse proxy, allows remote attackers to
conduct HTTP request smuggling attacks via a crafted Content-Length
HTTP header.
|
| CVE-2014-0096 |
java/org/apache/catalina/servlets/DefaultServlet.java in the default
servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x
before 8.0.4 does not properly restrict XSLT stylesheets, which allows
remote attackers to bypass security-manager restrictions and read
arbitrary files via a crafted web application that provides an XML
external entity declaration in conjunction with an entity reference,
related to an XML External Entity (XXE) issue.
|
| CVE-2014-0095 |
java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat
8.x before 8.0.4 allows remote attackers to cause a denial of service
(thread consumption) by using a "Content-Length: 0" AJP request to
trigger a hang in request processing.
|
| CVE-2014-0075 |
Integer overflow in the parseChunkHeader function in
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in
Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4
allows remote attackers to cause a denial of service (resource
consumption) via a malformed chunk size in chunked transfer coding of
a request during the streaming of data.
|
| CVE-2014-0050 |
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as
used in Apache Tomcat, JBoss Web, and other products, allows remote
attackers to cause a denial of service (infinite loop and CPU
consumption) via a crafted Content-Type header that bypasses a loop's
intended exit conditions.
|
| CVE-2014-0033 |
org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat
6.0.33 through 6.0.37 does not consider the disableURLRewriting
setting when handling a session ID in a URL, which allows remote
attackers to conduct session fixation attacks via a crafted URL.
|
| CVE-2013-6357 |
** DISPUTED ** Cross-site request forgery (CSRF) vulnerability in the
Manager application in Apache Tomcat 5.5.25 and earlier allows remote
attackers to hijack the authentication of administrators for requests
that manipulate application deployment via the POST method, as
demonstrated by a /manager/html/undeploy?path= URI. NOTE: the vendor
disputes the significance of this report, stating that "the Apache
Tomcat Security team has not accepted any reports of CSRF attacks
against the Manager application ... as they require a reckless system
administrator."
|
| CVE-2013-5534 |
Directory traversal vulnerability in the attachment service in the
Voice Message Web Service (aka VMWS or Cisco Unity Web Service) in
Cisco Unity Connection allows remote authenticated users to create
files, and consequently execute arbitrary JSP code, via a crafted
pathname for a file that is not a valid audio file, aka Bug ID
CSCuj22948.
|
| CVE-2013-5528 |
Directory traversal vulnerability in the Tomcat administrative web
interface in Cisco Unified Communications Manager allows remote
authenticated users to read arbitrary files via directory traversal
sequences in an unspecified input string, aka Bug ID CSCui78815.
|
| CVE-2013-4590 |
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before
8.0.0-RC10 allows attackers to obtain "Tomcat internals" information
by leveraging the presence of an untrusted web application with a
context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing
an external entity declaration in conjunction with an entity
reference, related to an XML External Entity (XXE) issue.
|
| CVE-2013-4444 |
Unrestricted file upload vulnerability in Apache Tomcat 7.x before
7.0.40, in certain situations involving outdated java.io.File code and
a custom JMX configuration, allows remote attackers to execute
arbitrary code by uploading and accessing a JSP file.
|
| CVE-2013-4322 |
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before
8.0.0-RC10 processes chunked transfer coding without properly handling
(1) a large total amount of chunked data or (2) whitespace characters
in an HTTP header value within a trailer field, which allows remote
attackers to cause a denial of service by streaming data. NOTE: this
vulnerability exists because of an incomplete fix for CVE-2012-3544.
|
| CVE-2013-4286 |
Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before
8.0.0-RC3, when an HTTP connector or AJP connector is used, does not
properly handle certain inconsistent HTTP request headers, which
allows remote attackers to trigger incorrect identification of a
request's length and conduct request-smuggling attacks via (1)
multiple Content-Length headers or (2) a Content-Length header and a
"Transfer-Encoding: chunked" header. NOTE: this vulnerability exists
because of an incomplete fix for CVE-2005-2090.
|
| CVE-2013-4062 |
IBM Rational Policy Tester 8.5 before 8.5.0.5 does not verify X.509
certificates from SSL servers, which allows man-in-the-middle
attackers to spoof Jazz Team servers, obtain sensitive information,
and modify the client-server data stream via a crafted certificate.
|
| CVE-2013-3507 |
The NeDi component in GroundWork Monitor Enterprise 6.7.0 allows
remote authenticated users to obtain sensitive information via a
direct request for (1) a configuration file, (2) a database dump, or
(3) the Tomcat status context.
|
| CVE-2013-2185 |
** DISPUTED ** The readObject method in the DiskFileItem class in
Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise
Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows
remote attackers to write to arbitrary files via a NULL byte in a file
name in a serialized instance, a similar issue to CVE-2013-2186. NOTE:
this issue is reportedly disputed by the Apache Tomcat team, although
Red Hat considers it a vulnerability. The dispute appears to regard
whether it is the responsibility of applications to avoid providing
untrusted data to be deserialized, or whether this class should
inherently protect against this issue.
|
| CVE-2013-2071 |
java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat
7.x before 7.0.40 does not properly handle the throwing of a
RuntimeException in an AsyncListener in an application, which allows
context-dependent attackers to obtain sensitive request information
intended for other applications in opportunistic circumstances via an
application that records the requests that it processes.
|
| CVE-2013-2067 |
java/org/apache/catalina/authenticator/FormAuthenticator.java in the
form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and
7.x before 7.0.33 does not properly handle the relationships between
authentication requirements and sessions, which allows remote
attackers to inject a request into a session by sending this request
during completion of the login form, a variant of a session fixation
attack.
|
| CVE-2013-2051 |
The Tomcat 6 DIGEST authentication functionality as used in Red Hat
Enterprise Linux 6 allows remote attackers to bypass intended access
restrictions by performing a replay attack after a nonce becomes
stale. NOTE: this issue is due to an incomplete fix for CVE-2012-5887.
|
| CVE-2013-1976 |
The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in
the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2
and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to
change the ownership of arbitrary files via a symlink attack on (a)
tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d)
tomcat7-initd.log.
|
| CVE-2013-1222 |
The Tomcat Web Management feature in Cisco Unified Customer Voice
Portal (CVP) Software before 9.0.1 ES 11 does not properly configure
Tomcat components, which allows remote attackers to launch arbitrary
custom web applications via a crafted (1) HTTP or (2) HTTPS request,
aka Bug ID CSCub38379.
|
| CVE-2013-1221 |
The Tomcat Web Management feature in Cisco Unified Customer Voice
Portal (CVP) Software before 9.0.1 ES 11 does not properly configure
Tomcat components, which allows remote attackers to execute arbitrary
code via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID
CSCub38384.
|
| CVE-2013-1088 |
Cross-site request forgery (CSRF) vulnerability in Novell iManager 2.7
before SP6 Patch 1 allows remote attackers to hijack the
authentication of arbitrary users by leveraging improper request
validation by iManager code deployed within an Apache Tomcat
container.
|
| CVE-2013-0346 |
** DISPUTED ** Apache Tomcat 7.x uses world-readable permissions for
the log directory and its files, which might allow local users to
obtain sensitive information by reading a file. NOTE: One Tomcat
distributor has stated "The tomcat log directory does not contain any
sensitive information."
|
| CVE-2012-5887 |
The HTTP Digest Access Authentication implementation in Apache Tomcat
5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not
properly check for stale nonce values in conjunction with enforcement
of proper credentials, which makes it easier for remote attackers to
bypass intended access restrictions by sniffing the network for valid
requests.
|
| CVE-2012-5886 |
The HTTP Digest Access Authentication implementation in Apache Tomcat
5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches
information about the authenticated user within the session state,
which makes it easier for remote attackers to bypass authentication
via vectors related to the session ID.
|
| CVE-2012-5885 |
The replay-countermeasure functionality in the HTTP Digest Access
Authentication implementation in Apache Tomcat 5.5.x before 5.5.36,
6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client
nonce) values instead of nonce (aka server nonce) and nc (aka
nonce-count) values, which makes it easier for remote attackers to
bypass intended access restrictions by sniffing the network for valid
requests, a different vulnerability than CVE-2011-1184.
|
| CVE-2012-5568 |
Apache Tomcat through 7.0.x allows remote attackers to cause a denial
of service (daemon outage) via partial HTTP requests, as demonstrated
by Slowloris.
|
| CVE-2012-4534 |
org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x
before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in
conjunction with sendfile and HTTPS, allows remote attackers to cause
a denial of service (infinite loop) by terminating the connection
during the reading of a response.
|
| CVE-2012-4431 |
org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat
6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to
bypass the cross-site request forgery (CSRF) protection mechanism via
a request that lacks a session identifier.
|
| CVE-2012-3908 |
Multiple cross-site request forgery (CSRF) vulnerabilities in the ISE
Administrator user interface (aka the Apache Tomcat interface) on
Cisco Identity Services Engine (ISE) 3300 series appliances before
1.1.0.665 Cumulative Patch 1 allow remote attackers to hijack the
authentication of administrators, aka Bug ID CSCty46684.
|
| CVE-2012-3546 |
org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before
6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows
remote attackers to bypass security-constraint checks by leveraging a
previous setUserPrincipal call and then placing /j_security_check at
the end of a URI.
|
| CVE-2012-3544 |
Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not
properly handle chunk extensions in chunked transfer coding, which
allows remote attackers to cause a denial of service by streaming
data.
|
| CVE-2012-3126 |
Unspecified vulnerability in the Solaris Cluster component in Oracle
Sun Products Suite 3.3 allows local users to affect confidentiality,
integrity, and availability via unknown vectors related to Apache
Tomcat Agent.
|
| CVE-2012-3096 |
Cisco Unity Connection (UC) 7.1, 8.0, and 8.5 allows remote
authenticated users to cause a denial of service (resource consumption
and administration outage) via extended use of the product, aka Bug ID
CSCtd79132.
|
| CVE-2012-2733 |
java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP
NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28
does not properly restrict the request-header size, which allows
remote attackers to cause a denial of service (memory consumption) via
a large amount of header data.
|
| CVE-2012-0022 |
Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before
7.0.23 uses an inefficient approach for handling parameters, which
allows remote attackers to cause a denial of service (CPU consumption)
via a request that contains many parameters and parameter values, a
different vulnerability than CVE-2011-4858.
|
| CVE-2011-5064 |
DigestAuthenticator.java in the HTTP Digest Access Authentication
implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before
6.0.33, and 7.x before 7.0.12 uses Catalina as the hard-coded server
secret (aka private key), which makes it easier for remote attackers
to bypass cryptographic protection mechanisms by leveraging knowledge
of this string, a different vulnerability than CVE-2011-1184.
|
| CVE-2011-5063 |
The HTTP Digest Access Authentication implementation in Apache Tomcat
5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not
check realm values, which might allow remote attackers to bypass
intended access restrictions by leveraging the availability of a
protection space with weaker authentication or authorization
requirements, a different vulnerability than CVE-2011-1184.
|
| CVE-2011-5062 |
The HTTP Digest Access Authentication implementation in Apache Tomcat
5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not
check qop values, which might allow remote attackers to bypass
intended integrity-protection requirements via a qop=auth value, a
different vulnerability than CVE-2011-1184.
|
| CVE-2011-4858 |
Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23
computes hash values for form parameters without restricting the
ability to trigger hash collisions predictably, which allows remote
attackers to cause a denial of service (CPU consumption) by sending
many crafted parameters.
|
| CVE-2011-4188 |
Buffer overflow in the Create Attribute function in jclient in Novell
iManager 2.7.4 before patch 4 allows remote authenticated users to
cause a denial of service (application crash) or possibly have
unspecified other impact via a crafted EnteredAttrName parameter, a
related issue to CVE-2010-1929.
|
| CVE-2011-3376 |
org/apache/catalina/core/DefaultInstanceManager.java in Apache Tomcat
7.x before 7.0.22 does not properly restrict ContainerServlets in the
Manager application, which allows local users to gain privileges by
using an untrusted web application to access the Manager application's
functionality.
|
| CVE-2011-3375 |
Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not
properly perform certain caching and recycling operations involving
request objects, which allows remote attackers to obtain unintended
read access to IP address and HTTP header information in opportunistic
circumstances by reading TCP data.
|
| CVE-2011-3190 |
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0
through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and
possibly other versions allow remote attackers to spoof AJP requests,
bypass authentication, and obtain sensitive information by causing the
connector to interpret a request body as a new request.
|
| CVE-2011-3011 |
BaseServiceImpl.class in CA ARCserve D2D r15 does not properly handle
sessions, which allows remote attackers to obtain credentials, and
consequently execute arbitrary commands, via unspecified vectors.
|
| CVE-2011-2729 |
native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3
through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32
through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on
Linux, does not drop capabilities, which allows remote attackers to
bypass read permissions for files via a request to an application.
|
| CVE-2011-2526 |
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before
7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO
connector, does not validate certain request attributes, which allows
local users to bypass intended file access restrictions or cause a
denial of service (infinite loop or JVM crash) by leveraging an
untrusted web application.
|
| CVE-2011-2481 |
Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace
an XML parser used for other web applications, which allows local
users to read or modify the (1) web.xml, (2) context.xml, or (3) tld
files of arbitrary web applications via a crafted application that is
loaded earlier than the target application. NOTE: this vulnerability
exists because of a CVE-2009-0783 regression.
|
| CVE-2011-2204 |
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before
7.0.17, when the MemoryUserDatabase is used, creates log entries
containing passwords upon encountering errors in JMX user creation,
which allows local users to obtain sensitive information by reading a
log file.
|
| CVE-2011-1582 |
Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a
servlet without following security constraints that have been
configured through annotations, which allows remote attackers to
bypass intended access restrictions via HTTP requests. NOTE: this
vulnerability exists because of an incomplete fix for CVE-2011-1088,
CVE-2011-1183, and CVE-2011-1419.
|
| CVE-2011-1571 |
Unspecified vulnerability in the XSL Content portlet in Liferay Portal
Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat
is used, allows remote attackers to execute arbitrary commands via
unknown vectors.
|
| CVE-2011-1570 |
Cross-site scripting (XSS) vulnerability in Liferay Portal Community
Edition (CE) 6.x before 6.0.6 GA, when Apache Tomcat is used, allows
remote authenticated users to inject arbitrary web script or HTML via
a message title, a different vulnerability than CVE-2004-2030.
|
| CVE-2011-1503 |
The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x
and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is
used, allows remote authenticated users to read arbitrary (1) XSL and
(2) XML files via a file:/// URL.
|
| CVE-2011-1502 |
Liferay Portal Community Edition (CE) 6.x before 6.0.6 GA, when Apache
Tomcat is used, allows remote authenticated users to read arbitrary
files via an entity declaration in conjunction with an entity
reference, related to an XML External Entity (aka XXE) issue.
|
| CVE-2011-1475 |
The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not
properly handle HTTP pipelining, which allows remote attackers to read
responses intended for other clients in opportunistic circumstances by
examining the application data in HTTP packets, related to "a mix-up
of responses for requests from different users."
|
| CVE-2011-1419 |
Apache Tomcat 7.x before 7.0.11, when web.xml has no security
constraints, does not follow ServletSecurity annotations, which allows
remote attackers to bypass intended access restrictions via HTTP
requests to a web application. NOTE: this vulnerability exists because
of an incomplete fix for CVE-2011-1088.
|
| CVE-2011-1318 |
Memory leak in org.apache.jasper.runtime.JspWriterImpl.response in the
JavaServer Pages (JSP) component in IBM WebSphere Application Server
(WAS) before 7.0.0.15 allows remote attackers to cause a denial of
service (memory consumption) by accessing a JSP page of an application
that is repeatedly stopped and restarted.
|
| CVE-2011-1184 |
The HTTP Digest Access Authentication implementation in Apache Tomcat
5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not
have the expected countermeasures against replay attacks, which makes
it easier for remote attackers to bypass intended access restrictions
by sniffing the network for valid requests, related to lack of
checking of nonce (aka server nonce) and nc (aka nonce-count or client
nonce count) values.
|
| CVE-2011-1183 |
Apache Tomcat 7.0.11, when web.xml has no login configuration, does
not follow security constraints, which allows remote attackers to
bypass intended access restrictions via HTTP requests to a meta-data
complete web application. NOTE: this vulnerability exists because of
an incorrect fix for CVE-2011-1088 and CVE-2011-1419.
|
| CVE-2011-1088 |
Apache Tomcat 7.x before 7.0.10 does not follow ServletSecurity
annotations, which allows remote attackers to bypass intended access
restrictions via HTTP requests to a web application.
|
| CVE-2011-0534 |
Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not
enforce the maxHttpHeaderSize limit for requests involving the NIO
HTTP connector, which allows remote attackers to cause a denial of
service (OutOfMemoryError) via a crafted request.
|
| CVE-2011-0013 |
Multiple cross-site scripting (XSS) vulnerabilities in the HTML
Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before
6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject
arbitrary web script or HTML, as demonstrated via the display-name
tag.
|
| CVE-2010-4368 |
awstats.cgi in AWStats before 7.0 on Windows accepts a configdir
parameter in the URL, which allows remote attackers to execute
arbitrary commands via a crafted configuration file located at a UNC
share pathname.
|
| CVE-2010-4367 |
awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the
URL, which allows remote attackers to execute arbitrary commands via a
crafted configuration file located on a (1) WebDAV server or (2) NFS
server.
|
| CVE-2010-4312 |
The default configuration of Apache Tomcat 6.x does not include the
HTTPOnly flag in a Set-Cookie header, which makes it easier for remote
attackers to hijack a session via script access to a cookie.
|
| CVE-2010-4172 |
Multiple cross-site scripting (XSS) vulnerabilities in the Manager
application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through
7.0.4 allow remote attackers to inject arbitrary web script or HTML
via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or
unspecified input to (3) sessionDetail.jsp or (4)
java/org/apache/catalina/manager/JspHelper.java, related to use of
untrusted web applications.
|
| CVE-2010-4094 |
The Tomcat server in IBM Rational Quality Manager and Rational Test
Lab Manager has a default password for the ADMIN account, which makes
it easier for remote attackers to execute arbitrary code by leveraging
access to the manager role. NOTE: this might overlap CVE-2009-3548.
|
| CVE-2010-3718 |
Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running
within a SecurityManager, does not make the ServletContext attribute
read-only, which allows local web applications to read or write files
outside of the intended working directory, as demonstrated using a
directory traversal attack.
|
| CVE-2010-2928 |
The vCenter Tomcat Management Application in VMware vCenter Server 4.1
before Update 1 stores log-on credentials in a configuration file,
which allows local users to gain privileges by reading this file.
|
| CVE-2010-2227 |
Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0
beta does not properly handle an invalid Transfer-Encoding header,
which allows remote attackers to cause a denial of service
(application outage) or obtain sensitive information via a crafted
header that interferes with "recycling of a buffer."
|
| CVE-2010-1929 |
Multiple stack-based buffer overflows in the
jclient._Java_novell_jclient_JClient_defineClass@20 function in
jclient.dll in the Tomcat web server in Novell iManager 2.7, 2.7.3,
and 2.7.3 FTF2 allow remote authenticated users to execute arbitrary
code via the (1) EnteredClassID or (2) NewClassName parameter to
nps/servlet/webacc.
|
| CVE-2010-1157 |
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might
allow remote attackers to discover the server's hostname or IP address
by sending a request for a resource that requires (1) BASIC or (2)
DIGEST authentication, and then reading the realm field in the
WWW-Authenticate header in the reply.
|
| CVE-2010-0570 |
Cisco Digital Media Manager (DMM) 5.0.x and 5.1.x has a default
password for the Tomcat administration account, which makes it easier
for remote attackers to execute arbitrary code via a crafted web
application, aka Bug ID CSCta03378.
|
| CVE-2010-0557 |
IBM Cognos Express 9.0 allows attackers to obtain unspecified access
to the Tomcat Manager component, and cause a denial of service, by
leveraging hardcoded credentials.
|
| CVE-2010-0219 |
Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects
Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a
default password of axis2 for the admin account, which makes it easier
for remote attackers to execute arbitrary code by uploading a crafted
web service.
|
| CVE-2010-0217 |
Zeacom Chat Server before 5.1 uses too short a random string for the
JSESSIONID value, which makes it easier for remote attackers to hijack
sessions or cause a denial of service (Chat Server crash or Tomcat
daemon crash) via a brute-force attack.
|
| CVE-2009-5120 |
The default configuration of Apache Tomcat in Websense Manager in
Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP
port 1812 from arbitrary source IP addresses, which makes it easier
for remote attackers to conduct cross-site scripting (XSS) attacks via
UTF-7 text to the 404 error page of a Project Woodstock service on
this port.
|
| CVE-2009-5119 |
The default configuration of Apache Tomcat in Websense Manager in
Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers
in conf/server.xml, which makes it easier for remote attackers to
obtain sensitive information by sniffing the network and then
conducting a brute-force attack against encrypted session data.
|
| CVE-2009-4844 |
ToutVirtual VirtualIQ Pro 3.2 build 7882 does not restrict access to
the /status URI on port 9080, which allows remote attackers to obtain
sensitive Tomcat information via a direct request.
|
| CVE-2009-4189 |
HP Operations Manager has a default password of OvW*busr1 for the
ovwebusr account, which allows remote attackers to execute arbitrary
code via a session that uses the manager role to conduct unrestricted
file upload attacks against the /manager servlet in the Tomcat servlet
container. NOTE: this might overlap CVE-2009-3099 and CVE-2009-3843.
|
| CVE-2009-4188 |
HP Operations Dashboard has a default password of j2deployer for the
j2deployer account, which allows remote attackers to execute arbitrary
code via a session that uses the manager role to conduct unrestricted
file upload attacks against the /manager servlet in the Tomcat servlet
container. NOTE: this might overlap CVE-2009-3098.
|
| CVE-2009-3843 |
HP Operations Manager 8.10 on Windows contains a "hidden account" in
the XML file that specifies Tomcat users, which allows remote
attackers to conduct unrestricted file upload attacks, and thereby
execute arbitrary code, by using the
org.apache.catalina.manager.HTMLManagerServlet class to make requests
to manager/html/upload.
|
| CVE-2009-3548 |
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0
through 5.5.28, and possibly earlier versions uses a blank default
password for the administrative user, which allows remote attackers to
gain privileges.
|
| CVE-2009-2902 |
Directory traversal vulnerability in Apache Tomcat 5.5.0 through
5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete
work-directory files via directory traversal sequences in a WAR
filename, as demonstrated by the ...war filename.
|
| CVE-2009-2901 |
The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and
6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase
files that remain from a failed undeploy, which might allow remote
attackers to bypass intended authentication requirements via HTTP
requests.
|
| CVE-2009-2696 |
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the
calendar application in the examples web application in Apache Tomcat
on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux
Desktop 5 allows remote attackers to inject arbitrary web script or
HTML via the time parameter, related to "invalid HTML." NOTE: this is
due to a missing fix for CVE-2009-0781.
|
| CVE-2009-2693 |
Directory traversal vulnerability in Apache Tomcat 5.5.0 through
5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or
overwrite arbitrary files via a .. (dot dot) in an entry in a WAR
file, as demonstrated by a ../../bin/catalina.bat entry.
|
| CVE-2009-1479 |
Directory traversal vulnerability in client/desktop/default.htm in
Boxalino before 09.05.25-0421 allows remote attackers to read
arbitrary files via a .. (dot dot) in the url parameter.
|
| CVE-2009-0783 |
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0
through 6.0.18 permits web applications to replace an XML parser used
for other web applications, which allows local users to read or modify
the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web
applications via a crafted application that is loaded earlier than the
target application.
|
| CVE-2009-0781 |
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the
calendar application in the examples web application in Apache Tomcat
4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18
allows remote attackers to inject arbitrary web script or HTML via the
time parameter, related to "invalid HTML."
|
| CVE-2009-0580 |
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0
through 6.0.18, when FORM authentication is used, allows remote
attackers to enumerate valid usernames via requests to
/j_security_check with malformed URL encoding of passwords, related to
improper error checking in the (1) MemoryRealm, (2) DataSourceRealm,
and (3) JDBCRealm authentication realms, as demonstrated by a %
(percent) value for the j_password parameter.
|
| CVE-2009-0033 |
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0
through 6.0.18, when the Java AJP connector and mod_jk load balancing
are used, allows remote attackers to cause a denial of service
(application outage) via a crafted request with invalid headers,
related to temporary blocking of connectors that have encountered
errors, as demonstrated by an error involving a malformed HTTP Host
header.
|
| CVE-2008-6722 |
Novell Access Manager 3 SP4 does not properly expire X.509 certificate
sessions, which allows physically proximate attackers to obtain a
logged-in session by using a victim's web-browser process that
continues to send the original and valid SSL sessionID, related to
inability of Apache Tomcat to clear entries from its SSL cache.
|
| CVE-2008-5519 |
The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat
allows remote attackers to obtain sensitive information via an
arbitrary request from an HTTP client, in opportunistic circumstances
involving (1) a request from a different client that included a
Content-Length header but no POST data or (2) a rapid series of
requests, related to noncompliance with the AJP protocol's
requirements for requests containing Content-Length headers.
|
| CVE-2008-5515 |
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0
through 6.0.18, and possibly earlier versions normalizes the target
pathname before filtering the query string when using the
RequestDispatcher method, which allows remote attackers to bypass
intended access restrictions and conduct directory traversal attacks
via .. (dot dot) sequences and the WEB-INF directory in a Request.
|
| CVE-2008-4308 |
The doRead method in Apache Tomcat 4.1.32 through 4.1.34 and 5.5.10
through 5.5.20 does not return a -1 to indicate when a certain error
condition has occurred, which can cause Tomcat to send POST content
from one request to a different request.
|
| CVE-2008-3271 |
Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers
to bypass an IP address restriction and obtain sensitive information
via a request that is processed concurrently with another request but
in a different thread, leading to an instance-variable overwrite
associated with a "synchronization problem" and lack of thread safety,
and related to RemoteFilterValve, RemoteAddrValve, and
RemoteHostValve.
|
| CVE-2008-2938 |
Directory traversal vulnerability in Apache Tomcat 4.1.0 through
4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when
allowLinking and UTF-8 are enabled, allows remote attackers to read
arbitrary files via encoded directory traversal sequences in the URI,
a different vulnerability than CVE-2008-2370. NOTE: versions earlier
than 6.0.18 were reported affected, but the vendor advisory lists
6.0.16 as the last affected version.
|
| CVE-2008-2370 |
Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0
through 6.0.16, when a RequestDispatcher is used, performs path
normalization before removing the query string from the URI, which
allows remote attackers to conduct directory traversal attacks and
read arbitrary files via a .. (dot dot) in a request parameter.
|
| CVE-2008-1947 |
Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9
through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to
inject arbitrary web script or HTML via the name parameter (aka the
hostname attribute) to host-manager/html/add.
|
| CVE-2008-1232 |
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0
through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows
remote attackers to inject arbitrary web script or HTML via a crafted
string that is used in the message argument to the
HttpServletResponse.sendError method.
|
| CVE-2008-0457 |
Unrestricted file upload vulnerability in the FileUpload class running
on the Symantec LiveState Apache Tomcat server, as used by Symantec
Backup Exec System Recovery Manager 7.0 and 7.0.1, allows remote
attackers to upload and execute arbitrary JSP files via unknown
vectors.
|
| CVE-2008-0128 |
The SingleSignOn Valve
(org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat
before 5.5.21 does not set the secure flag for the JSESSIONIDSSO
cookie in an https session, which can cause the cookie to be sent in
http requests and make it easier for remote attackers to capture this
cookie.
|
| CVE-2008-0002 |
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context
of the wrong request when an exception occurs during parameter
processing, which might allow remote attackers to obtain sensitive
information, as demonstrated by disconnecting during this processing
in order to trigger the exception.
|
| CVE-2007-6286 |
Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the
native APR connector is used, does not properly handle an empty
request to the SSL port, which allows remote attackers to trigger
handling of "a duplicate copy of one of the recent requests," as
demonstrated by using netcat to send the empty request.
|
| CVE-2007-5461 |
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through
4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14,
under certain configurations, allows remote authenticated users to
read arbitrary files via a WebDAV write request that specifies an
entity with a SYSTEM tag.
|
| CVE-2007-5366 |
The Tomcat 4.1-based Servlet Service in Fujitsu Interstage Application
Server 7.0 through 9.0.0 and Interstage Apworks/Studio 7.0 through
9.0.0 allows remote attackers to obtain sensitive information (web
root path) via unspecified vectors that trigger an error message,
probably related to enabling the useCanonCaches Java Virtual Machine
(JVM) option.
|
| CVE-2007-5342 |
The default catalina.policy in the JULI logging component in Apache
Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15 does not restrict
certain permissions for web applications, which allows attackers to
modify logging configuration options and overwrite arbitrary files, as
demonstrated by changing the (1) level, (2) directory, and (3) prefix
attributes in the org.apache.juli.FileHandler handler.
|
| CVE-2007-5333 |
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0
through 4.1.36 does not properly handle (1) double quote (")
characters or (2) %5C (encoded backslash) sequences in a cookie value,
which might cause sensitive information such as session IDs to be
leaked to remote attackers and enable session hijacking attacks. NOTE:
this issue exists because of an incomplete fix for CVE-2007-3385.
|
| CVE-2007-4724 |
Cross-site request forgery (CSRF) vulnerability in cal2.jsp in the
calendar examples application in Apache Tomcat 4.1.31 allows remote
attackers to add events as arbitrary users via the time and
description parameters.
|
| CVE-2007-3386 |
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet
for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote
attackers to inject arbitrary HTML and web script via crafted
requests, as demonstrated using the aliases parameter to an html/add
action.
|
| CVE-2007-3385 |
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0
to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character
sequence in a cookie value, which might cause sensitive information
such as session IDs to be leaked to remote attackers and enable
session hijacking attacks.
|
| CVE-2007-3384 |
Multiple cross-site scripting (XSS) vulnerabilities in
examples/servlet/CookieExample in Apache Tomcat 3.3 through 3.3.2
allow remote attackers to inject arbitrary web script or HTML via the
(1) Name or (2) Value field, related to error messages.
|
| CVE-2007-3383 |
Cross-site scripting (XSS) vulnerability in SendMailServlet in the
examples web application (examples/jsp/mail/sendmail.jsp) in Apache
Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.36 allows remote
attackers to inject arbitrary web script or HTML via the From field
and possibly other fields, related to generation of error messages.
|
| CVE-2007-3382 |
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0
to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters
in cookies, which might cause sensitive information such as session
IDs to be leaked and allow remote attackers to conduct session
hijacking attacks.
|
| CVE-2007-2450 |
Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager
and (2) Host Manager web applications in Apache Tomcat 4.0.0 through
4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through
5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to
inject arbitrary web script or HTML via a parameter name to
manager/html/upload, and other unspecified vectors.
|
| CVE-2007-2449 |
Multiple cross-site scripting (XSS) vulnerabilities in certain JSP
files in the examples web application in Apache Tomcat 4.0.0 through
4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through
5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject
arbitrary web script or HTML via the portion of the URI after the ';'
character, as demonstrated by a URI containing a "snp/snoop.jsp;"
sequence.
|
| CVE-2007-1860 |
mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23
decodes request URLs within the Apache HTTP Server before passing the
URL to Tomcat, which allows remote attackers to access protected pages
via a crafted prefix JkMount, possibly involving double-encoded ..
(dot dot) sequences and directory traversal, a related issue to
CVE-2007-0450.
|
| CVE-2007-1858 |
The default SSL cipher configuration in Apache Tomcat 4.1.28 through
4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain
insecure ciphers, including the anonymous cipher, which allows remote
attackers to obtain sensitive information or have other, unspecified
impacts.
|
| CVE-2007-1491 |
Apache Tomcat in Avaya S87XX, S8500, and S8300 before CM 3.1.3, and
Avaya SES allows connections from external interfaces via port 8009,
which exposes it to attacks from outside parties.
|
| CVE-2007-1358 |
Cross-site scripting (XSS) vulnerability in certain applications using
Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows
remote attackers to inject arbitrary web script or HTML via crafted
"Accept-Language headers that do not conform to RFC 2616".
|
| CVE-2007-1355 |
Multiple cross-site scripting (XSS) vulnerabilities in the
appdev/sample/web/hello.jsp example application in Tomcat 4.0.0
through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0
through 5.5.23, and 6.0.0 through 6.0.10 allow remote attackers to
inject arbitrary web script or HTML via the test parameter and
unspecified vectors.
|
| CVE-2007-0774 |
Stack-based buffer overflow in the map_uri_to_worker function
(native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK
Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and
5.5.20, allows remote attackers to execute arbitrary code via a long
URL that triggers the overflow in a URI worker map routine.
|
| CVE-2007-0450 |
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x
before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules
(mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read
arbitrary files via a .. (dot dot) sequence with combinations of (1)
"/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C)
characters in the URL, which are valid separators in Tomcat but not in
Apache.
|
| CVE-2006-7197 |
The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for
chunks, which can cause a buffer over-read in the ajp_process_callback
in mod_jk, which allows remote attackers to read portions of sensitive
memory.
|
| CVE-2006-7196 |
Cross-site scripting (XSS) vulnerability in the calendar application
example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31,
5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers
to inject arbitrary web script or HTML via the time parameter to
cal2.jsp and possibly unspecified other vectors. NOTE: this may be
related to CVE-2006-0254.1.
|
| CVE-2006-7195 |
Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in
Apache Tomcat 5.0.0 through 5.0.30 and 5.5.0 through 5.5.17 allows
remote attackers to inject arbitrary web script or HTML via certain
header values.
|
| CVE-2006-4517 |
Novell iManager 2.5 and 2.0.2 allows remote attackers to cause a
denial of service (crash) in the Tomcat server via a long TREE
parameter in an HTTP POST, which triggers a NULL pointer dereference.
|
| CVE-2006-3835 |
Apache Tomcat 5 before 5.5.17 allows remote attackers to list
directories via a semicolon (;) preceding a filename with a mapped
extension, as demonstrated by URLs ending with /;index.jsp and
/;help.do.
|
| CVE-2005-4838 |
Multiple cross-site scripting (XSS) vulnerabilities in the example web
applications for Jakarta Tomcat 5.5.6 and earlier allow remote
attackers to inject arbitrary web script or HTML via (1)
el/functions.jsp, (2) el/implicit-objects.jsp, and (3)
jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in
a request to snp/snoop.jsp. NOTE: other XSS issues in the manager
were simultaneously reported, but these require admin access and do
not cross privilege boundaries.
|
| CVE-2005-4836 |
The HTTP/1.1 connector in Apache Tomcat 4.1.15 through 4.1.40 does not
reject NULL bytes in a URL when allowLinking is configured, which
allows remote attackers to read JSP source files and obtain sensitive
information.
|
| CVE-2005-4703 |
Apache Tomcat 4.0.3, when running on Windows, allows remote attackers
to obtain sensitive information via a request for a file that contains
an MS-DOS device name such as lpt9, which leaks the pathname in an
error message, as demonstrated by lpt9.xtp using Nikto.
|
| CVE-2005-3510 |
Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a
denial of service (CPU consumption) via a large number of simultaneous
requests to list a web directory that has a large number of files.
|
| CVE-2005-3164 |
The AJP connector in Apache Tomcat 4.0.1 through 4.0.6 and 4.1.0
through 4.1.36, as used in Hitachi Cosminexus Application Server and
standalone, does not properly handle when a connection is broken
before request body data is sent in a POST request, which can lead to
an information leak when "unsuitable request body data" is used for a
different request, possibly related to Java Servlet pages.
|
| CVE-2005-2090 |
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0)
allows remote attackers to poison the web cache, bypass web
application firewall protection, and conduct XSS attacks via an HTTP
request with both a "Transfer-Encoding: chunked" header and a
Content-Length header, which causes Tomcat to incorrectly handle and
forward the body of the request in a way that causes the receiving
server to process it as a separate HTTP request, aka "HTTP Request
Smuggling."
|
| CVE-2005-1754 |
** DISPUTED **
JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16,
allows remote attackers to read arbitrary files via a full pathname in
the argument to the Download parameter. NOTE: Sun and Apache dispute
this issue. Sun states: "The report makes references to source code
and files that do not exist in the mentioned products."
|
| CVE-2005-1753 |
** DISPUTED **
ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache
Tomcat 5.0.16, allows remote attackers to view other users' e-mail
attachments via a direct request to /mailboxesdir/username@domainname.
NOTE: Sun and Apache dispute this issue. Sun states: "The report
makes references to source code and files that do not exist in the
mentioned products."
|
| CVE-2005-1601 |
MRO Maximo Self Service 4 and 5 stores certain information under the
web document root using file extensions that are not processed by
Tomcat, which allows remote attackers to obtain sensitive information
via a direct request for the file, such as MXServer.properties.
|
| CVE-2005-1507 |
Buffer overflow in the Tomcat plugin in 4d WebSTAR 5.33 and 5.4 allows
remote attackers to cause a denial of service and possibly execute
arbitrary code via a long URL.
|
| CVE-2005-0808 |
Apache Tomcat before 5.x allows remote attackers to cause a denial of
service (application crash) via a crafted AJP12 packet to TCP port
8007.
|
| CVE-2004-1452 |
Tomcat before 5.0.27-r3 in Gentoo Linux sets the default permissions
on the init scripts as tomcat:tomcat, but executes the scripts with
root privileges, which could allow local users in the tomcat group to
execute arbitrary commands as root by modifying the scripts.
|
| CVE-2003-0866 |
The Catalina org.apache.catalina.connector.http package in Tomcat
4.0.x up to 4.0.3 allows remote attackers to cause a denial of service
via several requests that do not follow the HTTP protocol, which
causes Tomcat to reject later requests.
|
| CVE-2003-0045 |
Jakarta Tomcat before 3.3.1a on certain Windows systems may allow
remote attackers to cause a denial of service (thread hang and
resource consumption) via a request for a JSP page containing an
MS-DOS device name, such as aux.jsp.
|
| CVE-2003-0044 |
Multiple cross-site scripting (XSS) vulnerabilities in the (1)
examples and (2) ROOT web applications for Jakarta Tomcat 3.x through
3.3.1a allow remote attackers to insert arbitrary web script or HTML.
|
| CVE-2003-0043 |
Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier,
uses trusted privileges when processing the web.xml file, which could
allow remote attackers to read portions of some files through the
web.xml file.
|
| CVE-2003-0042 |
Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier,
allows remote attackers to list directories even with an index.html or
other file present, or obtain unprocessed source code for a JSP file,
via a URL containing a null character.
|
| CVE-2002-2272 |
Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3
through 1.3.27, allows remote attackers to cause a denial of service
(desynchronized communications) via an HTTP GET request with a
Transfer-Encoding chunked field with invalid values.
|
| CVE-2002-2009 |
Apache Tomcat 4.0.1 allows remote attackers to obtain the web root
path via HTTP requests for JSP files preceded by (1) +/, (2) >/, (3)
</, and (4) %20/, which leaks the pathname in an error message.
|
| CVE-2002-2008 |
Apache Tomcat 4.0.3 for Windows allows remote attackers to obtain the
web root path via an HTTP request for a resource that does not exist,
such as lpt9, which leaks the information in an error message.
|
| CVE-2002-2007 |
The default installations of Apache Tomcat 3.2.3 and 3.2.4 allows
remote attackers to obtain sensitive system information such as
directory listings and web root path, via erroneous HTTP requests for
Java Server Pages (JSP) in the (1) test/jsp, (2) samples/jsp and (3)
examples/jsp directories, or the (4) test/realPath.jsp servlet, which
leaks pathnames in error messages.
|
| CVE-2002-2006 |
The default installation of Apache Tomcat 4.0 through 4.1 and 3.0
through 3.3.1 allows remote attackers to obtain the installation path
and other sensitive system information via the (1) SnoopServlet or (2)
TroubleShooter example servlets.
|
| CVE-2002-1895 |
The servlet engine in Jakarta Apache Tomcat 3.3 and 4.0.4, when using
IIS and the ajp1.3 connector, allows remote attackers to cause a
denial of service (crash) via a large number of HTTP GET requests for
an MS-DOS device such as AUX, LPT1, CON, or PRN.
|
| CVE-2002-1567 |
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1 allows
remote attackers to execute arbitrary web script and steal cookies via
a URL with encoded newlines followed by a request to a .jsp file whose
name contains the script.
|
| CVE-2002-1394 |
Apache Tomcat 4.0.5 and earlier, when using both the invoker servlet
and the default servlet, allows remote attackers to read source code
for server files or bypass certain protections, a variant of
CAN-2002-1148.
|
| CVE-2002-1148 |
The default servlet (org.apache.catalina.servlets.DefaultServlet) in
Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read
source code for server files via a direct request to the servlet.
|
| CVE-2002-0936 |
The Java Server Pages (JSP) engine in Tomcat allows web page owners to
cause a denial of service (engine crash) on the web server via a JSP
page that calls WPrinterJob().pageSetup(null,null).
|
| CVE-2002-0935 |
Apache Tomcat 4.0.3, and possibly other versions before 4.1.3 beta,
allows remote attackers to cause a denial of service (resource
exhaustion) via a large number of requests to the server with null
characters, which causes the working threads to hang.
|
| CVE-2002-0682 |
Cross-site scripting vulnerability in Apache Tomcat 4.0.3 allows
remote attackers to execute script as other web users via script in a
URL with the /servlet/ mapping, which does not filter the script when
an exception is thrown by the servlet.
|
| CVE-2002-0493 |
Apache Tomcat may be started without proper security settings if
errors are encountered while reading the web.xml file, which could
allow attackers to bypass intended restrictions.
|
| CVE-2001-1563 |
Unknown vulnerability in Tomcat 3.2.1 running on HP Secure OS for
Linux 1.0 allows attackers to access servlet resources. NOTE: due to
the vagueness of the vendor advisory, it is not clear whether this
issue is already covered by other CVE identifiers.
|
| CVE-2001-0917 |
Jakarta Tomcat 4.0.1 allows remote attackers to reveal physical path
information by requesting a long URL with a .JSP extension.
|
| CVE-2001-0829 |
A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a
malicious webmaster to embed Javascript in a request for a .JSP file,
which causes the Javascript to be inserted into an error message.
|
| CVE-2001-0590 |
Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a
remote attacker to read the source code to arbitrary 'jsp' files via a
malformed URL request which does not end with an HTTP protocol
specification (i.e. HTTP/1.0).
|
| CVE-2000-1210 |
Directory traversal vulnerability in source.jsp of Apache Tomcat
before 3.1 allows remote attackers to read arbitrary files via a ..
(dot dot) in the argument to source.jsp.
|
| CVE-2000-0760 |
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals
sensitive system information when a remote attacker requests a
nonexistent URL with a .snp extension.
|
| CVE-2000-0759 |
Jakarta Tomcat 3.1 under Apache reveals physical path information when
a remote attacker requests a URL that does not exist, which generates
an error message that includes the physical path.
|
| CVE-2000-0672 |
The default configuration of Jakarta Tomcat does not restrict access
to the /admin context, which allows remote attackers to read arbitrary
files by directly calling the administrative servlets to add a context
for the root directory.
|