Information Exposure Affecting tomcat package, versions <9.0.36-3.79.1


0.0
high

Snyk CVSS

    Attack Complexity Low
    Confidentiality High

    Threat Intelligence

    EPSS 0.22% (60th percentile)
Expand this section
NVD
7.5 high
Expand this section
SUSE
7.5 high
Expand this section
Red Hat
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-SLES150-TOMCAT-2683522
  • published 14 Apr 2022
  • disclosed 30 Mar 2021

How to fix?

Upgrade SLES:15.0 tomcat to version 9.0.36-3.79.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tomcat package and not the tomcat package as distributed by SLES. See How to fix? for SLES:15.0 relevant fixed versions and status.

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

References