Authentication Bypass Using an Alternate Path or Channel in Apache Tomcat
Critical severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Apr 18, 2024
Package
Affected versions
>= 9.0.0.M1, <= 9.0.0.M9
>= 8.5.0, <= 8.5.4
>= 8.0.0RC1, <= 8.0.36
>= 7.0.0, <= 7.0.70
>= 6.0.0, <= 6.0.45
Patched versions
9.0.0.M10
8.5.5
8.0.37
7.0.72
6.0.47
>= 9.0.0.M1, <= 9.0.0.M9
>= 8.5.0, <= 8.5.4
>= 8.0.0RC1, <= 8.0.36
>= 7.0.0, <= 7.0.70
9.0.0.M10
8.5.5
8.0.37
7.0.72
Description
Published by the National Vulnerability Database
Aug 10, 2017
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jul 6, 2022
Last updated
Apr 18, 2024
In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
References