Information Exposure Affecting org.apache.tomcat.embed:tomcat-embed-core Open this link in a new tab package, versions [7.0.0,7.0.68) [8.0.0-RC1,8.0.32) [9.0.0.M1,9.0.0.M3)


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHETOMCATEMBED-30986

  • published

    22 Feb 2016

  • disclosed

    22 Feb 2016

  • credit

    Unknown

Overview

org.apache.tomcat.embed:tomcat-embed-core Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.

References