Cross-site Request Forgery (CSRF) Affecting org.apache.tomcat:tomcat package, versions [7,7.0.68) [8,8.0.31) [9-alpha,9.0.0.M2]
Threat Intelligence
EPSS
0.36% (73rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHETOMCAT-30880
- published 22 Feb 2016
- disclosed 22 Feb 2016
- credit Unknown
Introduced: 22 Feb 2016
CVE-2015-5351 Open this link in a new tabOverview
org.apache.tomcat:tomcat
The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
References
CVSS Scores
version 3.1