org.apache.tomcat:jasper@6.0.20 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.tomcat:jasper package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Access Restriction Bypass

org.apache.tomcat:jasper is a maven plugin for Tomcats JSP Parser.

Affected versions of this package are vulnerable to Access Restriction Bypass. It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.

How to fix Access Restriction Bypass?

Upgrade org.apache.tomcat:jasper to version 6.0.47 or higher.

[6.0.13,6.0.47)
  • H
Access Restriction Bypass

org.apache.tomcat:jasper is a maven plugin for Tomcats JSP Parser.

Affected versions of this package are vulnerable to Access Restriction Bypass. It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.

How to fix Access Restriction Bypass?

Upgrade org.apache.tomcat:jasper to version 6.0.47 or higher.

[6.0.13,6.0.47)
  • M
Improper Access Control

org.apache.tomcat:jasper is a maven plugin for Tomcats JSP Parser.

Affected versions of this package are vulnerable to Improper Access Control. It does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.

How to fix Improper Access Control?

Upgrade org.apache.tomcat:jasper to version 6.0.44 or higher.

[6,6.0.44)
  • M
Arbitrary File Read

org.apache.tomcat:jasper is a maven plugin for Tomcats JSP Parser.

Affected versions of this package are vulnerable to Arbitrary File Read. Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.

How to fix Arbitrary File Read?

Upgrade org.apache.tomcat:jasper to version 6.0.40 or higher.

[6.0,6.0.40)
  • M
Information Exposure

org.apache.tomcat:jasper Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

[6,6.0.39)