org.apache.tomcat:tomcat-websocket@8.5.29 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.tomcat:tomcat-websocket package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation.

Affected versions of this package are vulnerable to Denial of Service (DoS) when a WebSocket client can keep a WebSocket connection open which is leading to increased resource consumption.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tomcat:tomcat-websocket to version 8.5.99, 9.0.86, 10.1.19, 1.0.0-M17 or higher.

[8.5.0,8.5.99) [9.0.0-M1,9.0.86) [10.1.0-M1,10.1.19) [11.0.0-M1,1.0.0-M17)
  • H
Improper Resource Shutdown or Release

org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation.

Affected versions of this package are vulnerable to Improper Resource Shutdown or Release. When a web application sends a WebSocket message concurrently with the WebSocket connection closing, the application may continue to use the socket after it has been closed. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.

How to fix Improper Resource Shutdown or Release?

Upgrade org.apache.tomcat:tomcat-websocket to version 8.5.76, 9.0.21 or higher.

[8.5.0,8.5.76) [9.0.0.M1,9.0.21)
  • H
Denial of Service (DoS)

org.apache.tomcat:tomcat-websocket is a Tomcat WebSocket (JSR356) implementation.

Affected versions of this package are vulnerable to Denial of Service (DoS). The payload length in a WebSocket frame was not correctly validated. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tomcat:tomcat-websocket to version 10.0.0-M7, 9.0.37, 8.5.57 or higher.

[10.0.0-M1,10.0.0-M7) [9.0.0.M1,9.0.37) [8.5.0,8.5.57)
  • H
Insufficient Hostname Verification

org.apache.tomcat:tomcat.websocket is an open source implementation of the Java Servlet, JavaServer Pages, Java Expression Language and Java WebSocket technologies.

Affected versions of this package are vulnerable to Insufficient Hostname Verification. It did not verify if the hostname in the TLS certificate and the actual hostname of the remote host matched.

How to fix Insufficient Hostname Verification?

Upgrade org.apache.tomcat:tomcat.websocket to versions 7.0.90, 8.0.53,8.5.32, 9.0.10 or higher.

[8.0.0-RC1,8.0.53) [8.5.0,8.5.32) [9.0.0.M1,9.0.10)