org.apache.tomcat:tomcat-jasper@7.0.23 vulnerabilities
-
latest version
11.0.1
-
latest non vulnerable version
-
first published
14 years ago
-
latest version published
19 days ago
-
licenses detected
- [0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.tomcat:tomcat-jasper package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.tomcat:tomcat-jasper is a Tomcats JSP Parser Affected versions of this package are vulnerable to Access Restriction Bypass. It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. How to fix Access Restriction Bypass? Upgrade |
[7.0.0,7.0.72)
[8,8.0.37)
[8.5.0,8.5.5)
[9-alpha,9.0.0.M10)
|
org.apache.tomcat:tomcat-jasper is a Tomcats JSP Parser Affected versions of this package are vulnerable to Access Restriction Bypass. It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. How to fix Access Restriction Bypass? Upgrade |
[7.0.0,7.0.72)
[8,8.0.37)
[8.5.0,8.5.5)
[9-alpha,9.0.0.M10)
|
org.apache.tomcat:tomcat-jasper is a Tomcats JSP Parser Affected versions of this package are vulnerable to Improper Access Control. It does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation. How to fix Improper Access Control? Upgrade |
[7,7.0.58)
[8,8.0.16)
|
org.apache.tomcat:tomcat-jasper is a Tomcats JSP Parser Affected versions of this package are vulnerable to Arbitrary File Read. Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application. How to fix Arbitrary File Read? Upgrade |
[7.0.0,7.0.54)
[8,8.0.6)
|
|
[7.0.0,7.0.50)
[8.0.0-RC1,8.0.0-RC10)
|