Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

 Sponsor

Project: tomcat9-config

com.github.hazendaz.tomcat:tomcat9-config:9.0.89

Scan Information (show all):

Summary

Display: Showing Vulnerable Dependencies (click to show all)

DependencyVulnerability IDsPackageHighest SeverityCVE CountConfidenceEvidence Count
checker-qual-3.42.0.jarpkg:maven/org.checkerframework/checker-qual@3.42.0 046
error_prone_annotations-2.26.1.jarpkg:maven/com.google.errorprone/error_prone_annotations@2.26.1 029
j2objc-annotations-3.0.0.jarpkg:maven/com.google.j2objc/j2objc-annotations@3.0.0 033
jsr305-3.0.2.jarpkg:maven/com.google.code.findbugs/jsr305@3.0.2 017
lombok-1.18.32.jar: mavenEcjBootstrapAgent.jar 07
lombok-1.18.32.jarpkg:maven/org.projectlombok/lombok@1.18.32 036
modernizer-maven-annotations-2.8.0.jarpkg:maven/org.gaul/modernizer-maven-annotations@2.8.0 019
spotbugs-annotations-4.8.3.jarpkg:maven/com.github.spotbugs/spotbugs-annotations@4.8.3 053
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: annotations-api.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
 0Low30
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: bootstrap.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:* 0Highest16
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: catalina-ant.jarcpe:2.3:a:apache:ant:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
 0High14
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: catalina-ha.jarcpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:* 0Highest22
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: catalina.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
 0Highest20
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: commons-daemon.jarcpe:2.3:a:apache:apache_commons_daemon:1.3.4:*:*:*:*:*:*:*pkg:maven/commons-daemon/commons-daemon@1.3.4 0Low84
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: ecj-4.20.jar 025
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: el-api.jarcpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
HIGH30Medium20
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jasper-el.jarcpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:* 0Low26
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jasper.jarcpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:* 0Highest20
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jaspic-api.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
 0Low38
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jsp-api.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
 0Low39
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: sample.war 08
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: servlet-api.jarcpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
HIGH29Medium41
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: taglibs-standard-impl-1.2.5.jarcpe:2.3:a:apache:standard_taglibs:1.2.5:*:*:*:*:*:*:*pkg:maven/org.apache.taglibs/taglibs-standard-impl@1.2.5 0Highest54
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-api.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
 0Highest18
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-i18n-cs.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
 0Low9
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-i18n-fr.jarcpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:nfr:nfr:9.0.89:*:*:*:*:*:*:*
 0Low9
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-juli.jarcpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:* 0Highest18
tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: websocket-api.jar 025

Dependencies (vulnerable)

checker-qual-3.42.0.jar

Description:

checker-qual contains annotations (type qualifiers) that a programmer
writes to specify Java code for type-checking by the Checker Framework.

License:

The MIT License: http://opensource.org/licenses/MIT
File Path: C:\Users\Jeremy\.m2\repository\org\checkerframework\checker-qual\3.42.0\checker-qual-3.42.0.jar
MD5: 4c55448dcbfe9c3702f7758fc8fe0086
SHA1: 638ec33f363a94d41a4f03c3e7d3dcfba64e402d
SHA256:ccaedd33af0b7894d9f2f3b644f4d19e43928e32902e61ac4d10777830f5aac7
Referenced In Project/Scope: tomcat9-config:provided
checker-qual-3.42.0.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/com.github.hazendaz.tomcat/tomcat9-config@9.0.89

Identifiers

error_prone_annotations-2.26.1.jar

Description:

Error Prone is a static analysis tool for Java that catches common programming mistakes at compile-time.

License:

Apache 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\com\google\errorprone\error_prone_annotations\2.26.1\error_prone_annotations-2.26.1.jar
MD5: 64c623e550068e3b2708e5d901865c56
SHA1: c1fde57694bdc14e8618899aaa6e857d9465d7de
SHA256:de25f2d9a2156529bd765f51d8efdfc0dfa7301e04efb9cc75b7f10cf5d0e0fb
Referenced In Project/Scope: tomcat9-config:provided
error_prone_annotations-2.26.1.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/com.github.hazendaz.tomcat/tomcat9-config@9.0.89

Identifiers

j2objc-annotations-3.0.0.jar

Description:

    A set of annotations that provide additional information to the J2ObjC
    translator to modify the result of translation.
  

License:

Apache License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\com\google\j2objc\j2objc-annotations\3.0.0\j2objc-annotations-3.0.0.jar
MD5: f59529b29202a5baf37f491ea5ec8627
SHA1: 7399e65dd7e9ff3404f4535b2f017093bdb134c7
SHA256:88241573467ddca44ffd4d74aa04c2bbfd11bf7c17e0c342c94c9de7a70a7c64
Referenced In Project/Scope: tomcat9-config:provided
j2objc-annotations-3.0.0.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/com.github.hazendaz.tomcat/tomcat9-config@9.0.89

Identifiers

jsr305-3.0.2.jar

Description:

JSR305 Annotations for Findbugs

License:

The Apache Software License, Version 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\com\google\code\findbugs\jsr305\3.0.2\jsr305-3.0.2.jar
MD5: dd83accb899363c32b07d7a1b2e4ce40
SHA1: 25ea2e8b0c338a877313bd4672d3fe056ea78f0d
SHA256:766ad2a0783f2687962c8ad74ceecc38a28b9f72a2d085ee438b7813e928d0c7
Referenced In Project/Scope: tomcat9-config:provided
jsr305-3.0.2.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/com.github.spotbugs/spotbugs-annotations@4.8.3

Identifiers

lombok-1.18.32.jar: mavenEcjBootstrapAgent.jar

File Path: C:\Users\Jeremy\.m2\repository\org\projectlombok\lombok\1.18.32\lombok-1.18.32.jar\lombok\launch\mavenEcjBootstrapAgent.jar
MD5: 81090c80616485973f6cd4a19d72bbdb
SHA1: ed1e7c8794dea7c7f7050098d56b2751b9f91288
SHA256:e97851350e56f4d1b02356ef61276886831e3a5e33a914ea95e878e2a46df69e
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

  • None

lombok-1.18.32.jar

Description:

Spice up your java: Automatic Resource Management, automatic generation of getters, setters, equals, hashCode and toString, and more!

License:

The MIT License: https://projectlombok.org/LICENSE
File Path: C:\Users\Jeremy\.m2\repository\org\projectlombok\lombok\1.18.32\lombok-1.18.32.jar
MD5: 56e9be7b9a26802ac0c784ad824f3a29
SHA1: 17d46b3e205515e1e8efd3ee4d57ce8018914163
SHA256:97574674e2a25f567a313736ace00df8787d443de316407d57fc877d9f19a65d
Referenced In Project/Scope: tomcat9-config:provided
lombok-1.18.32.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/com.github.hazendaz.tomcat/tomcat9-config@9.0.89

Identifiers

modernizer-maven-annotations-2.8.0.jar

File Path: C:\Users\Jeremy\.m2\repository\org\gaul\modernizer-maven-annotations\2.8.0\modernizer-maven-annotations-2.8.0.jar
MD5: 57078091b544a42461a328cccb46779a
SHA1: 5b1f18c161ae683384b2574cf93084d74d15a715
SHA256:a7ce2957c2301fdae8bb65f66fe484732fc3efc0f2e584d5e0da64267070da0e
Referenced In Project/Scope: tomcat9-config:provided
modernizer-maven-annotations-2.8.0.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/com.github.hazendaz.tomcat/tomcat9-config@9.0.89

Identifiers

spotbugs-annotations-4.8.3.jar

Description:

Annotations the SpotBugs tool supports

License:

GNU LESSER GENERAL PUBLIC LICENSE, Version 2.1: https://www.gnu.org/licenses/old-licenses/lgpl-2.1.en.html
File Path: C:\Users\Jeremy\.m2\repository\com\github\spotbugs\spotbugs-annotations\4.8.3\spotbugs-annotations-4.8.3.jar
MD5: cd5917b77643c3a7ba5420aea78f940c
SHA1: 05d2dc4ca5b632976371155252499819aea372ed
SHA256:e5d4f60be8e57595766ba7f1d4535dc46aebf98dae05e16372a4d4120d3ebb6b
Referenced In Project/Scope: tomcat9-config:provided
spotbugs-annotations-4.8.3.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/com.github.hazendaz.tomcat/tomcat9-config@9.0.89

Identifiers

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: annotations-api.jar

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\annotations-api.jar
MD5: b4309e19bc21787e2fc5846666570a43
SHA1: 5b82217549d600eb54bc5affa34b28e8feb78e35
SHA256:8d7816dce287e92a6abac2987915c750550d8ca454e311a072ebfde38e23a148
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

  • cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: bootstrap.jar

File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\bin\bootstrap.jar
MD5: b1a9daead835c684523f20d7538d8836
SHA1: 48c17e424763e8aacdf7df6d87a585149e0ee7f2
SHA256:80e9b7d15e0cd5b97611b43bb6a1e5f3f5e0c9fa63068084d49fe8bb00de4fa5
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: catalina-ant.jar

File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\catalina-ant.jar
MD5: b043615d8d439109a98333c275465374
SHA1: b3970f8e12b8c67e66a47988a1ca085a20b1090a
SHA256:3442088619b9eba54faa2f96a11826aad7faee9a35c7f8fcdebdd05f18164df8
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: catalina-ha.jar

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\catalina-ha.jar
MD5: 002fc0a226ac202d24de8200e19b0f0a
SHA1: 81b1ca84d32f5c5e186598dfe7af5e140ee3f211
SHA256:62e7183c850ea9ea77f0780d2c0c55c481cc9bbd1d268d6c35add51b770016f2
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: catalina.jar

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\catalina.jar
MD5: 2f56cfd359c32f86bbdf67aa809d2b9f
SHA1: add8f20a7293024e7147ca04c7161ffe45d6f822
SHA256:008834de28d28b66027acf66c846b0630daf11679300524d1b6b544d22bc3b2f
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: commons-daemon.jar

Description:

    Apache Commons Daemon software is a set of utilities and Java support
    classes for running Java applications as server processes. These are
    commonly known as 'daemon' processes in Unix terminology (hence the
    name). On Windows they are called 'services'.
  

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\bin\commons-daemon.jar
MD5: 9bb5b7d2633106db85cac262be11a871
SHA1: 9781527cd4f5b235403e019608cc10571761afdb
SHA256:d8f72a32b7ba6af6f1a1388e81b57ebaed82d2f06e6d77e1ebbc4f5cfd4efb18
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: ecj-4.20.jar

File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\ecj-4.20.jar
MD5: ee47966a67cd4019f1b8ccac74ba8dca
SHA1: 4837be609a3368a0f7e7cf0dc1bdbc7fe94993de
SHA256:ac0ba5876eaf7ebb47749a0d1be179c51f194b9dd0b875d1c09e1b530f5a2db5
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

  • None

tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: el-api.jar

License:

https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\el-api.jar
MD5: bf72a5dab2cce571858aa464e6901379
SHA1: 31851789981ca79ef1603d881cee66b4d1ee69d7
SHA256:1b0059142473007ea5b3692fd0f7be65487d36a078ddf14f66e64584f84a3d45
Referenced In Project/Scope: tomcat9-config:provided

Identifiers

CVE-2020-8022  

A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.
CWE-276 Incorrect Default Permissions

CVSSv2:
  • Base Score: HIGH (7.2)
  • Vector: /AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3:
  • Base Score: HIGH (7.8)
  • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.8/RC:R/MAV:A

References:

Vulnerable Software & Versions: (show all)

CVE-2002-0493  

Apache Tomcat may be started without proper security settings if errors are encountered while reading the web.xml file, which could allow attackers to bypass intended restrictions.
CWE-254 7PK - Security Features

CVSSv2:
  • Base Score: HIGH (7.5)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

References:

Vulnerable Software & Versions:

CVE-2009-3548  

The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
CWE-255 Credentials Management Errors

CVSSv2:
  • Base Score: HIGH (7.5)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2013-2185  

The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186.  NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue
CWE-20 Improper Input Validation

CVSSv2:
  • Base Score: HIGH (7.5)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2003-0044  

Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (6.8)
  • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2013-4444  

Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.
CWE-94 Improper Control of Generation of Code ('Code Injection')

CVSSv2:
  • Base Score: MEDIUM (6.8)
  • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

References:
  • secalert@redhat.com - Patch

Vulnerable Software & Versions: (show all)

CVE-2013-6357  

Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI.  NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator.
CWE-352 Cross-Site Request Forgery (CSRF)

CVSSv2:
  • Base Score: MEDIUM (6.8)
  • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2000-0760  

The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (6.4)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:N

References:

Vulnerable Software & Versions: (show all)

CVE-2013-4286  

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.
CWE-20 Improper Input Validation

CVSSv2:
  • Base Score: MEDIUM (5.8)
  • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:N

References:

Vulnerable Software & Versions: (show all)

CVE-2000-0672  

The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.
NVD-CWE-noinfo

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions: (show all)

CVE-2000-1210  

Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the argument to source.jsp.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions:

CVE-2001-0590  

Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions:

CVE-2002-1148  

The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions: (show all)

CVE-2002-2006  

The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions: (show all)

CVE-2003-0042  

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, allows remote attackers to list directories even with an index.html or other file present, or obtain unprocessed source code for a JSP file, via a URL containing a null character.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions: (show all)

CVE-2003-0043  

Jakarta Tomcat before 3.3.1a, when used with JDK 1.3.1 or earlier, uses trusted privileges when processing the web.xml file, which could allow remote attackers to read portions of some files through the web.xml file.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions: (show all)

CVE-2003-0045  

Jakarta Tomcat before 3.3.1a on certain Windows systems may allow remote attackers to cause a denial of service (thread hang and resource consumption) via a request for a JSP page containing an MS-DOS device name, such as aux.jsp.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2005-0808  

Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.
NVD-CWE-Other

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2008-0128  

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
CWE-16 Configuration

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions:

CVE-2014-0075  

Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
CWE-189 Numeric Errors

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2005-4838  

Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp.  NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CVSSv2:
  • Base Score: MEDIUM (4.3)
  • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

References:
  • secalert@redhat.com - Patch

Vulnerable Software & Versions:

CVE-2006-7196  

Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors.  NOTE: this may be related to CVE-2006-0254.1.
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CVSSv2:
  • Base Score: MEDIUM (4.3)
  • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

References:

    Vulnerable Software & Versions: (show all)

    CVE-2007-2449  

    Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
    NVD-CWE-Other

    CVSSv2:
    • Base Score: MEDIUM (4.3)
    • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

    References:
    • secalert@redhat.com - Patch

    Vulnerable Software & Versions: (show all)

    CVE-2009-2696  

    Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.
    CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

    CVSSv2:
    • Base Score: MEDIUM (4.3)
    • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

    References:

    Vulnerable Software & Versions:

    CVE-2013-4322  

    Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.
    CWE-20 Improper Input Validation

    CVSSv2:
    • Base Score: MEDIUM (4.3)
    • Vector: /AV:N/AC:M/Au:N/C:N/I:N/A:P

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2013-4590  

    Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

    CVSSv2:
    • Base Score: MEDIUM (4.3)
    • Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2014-0096  

    java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    CWE-264 Permissions, Privileges, and Access Controls

    CVSSv2:
    • Base Score: MEDIUM (4.3)
    • Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2014-0099  

    Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
    CWE-189 Numeric Errors

    CVSSv2:
    • Base Score: MEDIUM (4.3)
    • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2014-0119  

    Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.
    CWE-264 Permissions, Privileges, and Access Controls

    CVSSv2:
    • Base Score: MEDIUM (4.3)
    • Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2007-1358  

    Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
    CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

    CVSSv2:
    • Base Score: LOW (2.6)
    • Vector: /AV:N/AC:H/Au:N/C:N/I:P/A:N

    References:

    Vulnerable Software & Versions: (show all)

    tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jasper-el.jar

    License:

    https://www.apache.org/licenses/LICENSE-2.0.txt
    File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\jasper-el.jar
    MD5: 0c0387b8193afe0825b450bc2032b4c7
    SHA1: 45bfa83d0fe761a8dc89f9efd42eab82288dd7fe
    SHA256:652d78aaa853f0cfa248a7947439294fe70b7a3f810abcfe927c2a58878b76d8
    Referenced In Project/Scope: tomcat9-config:provided

    Identifiers

    • cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  

    tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jasper.jar

    License:

    https://www.apache.org/licenses/LICENSE-2.0.txt
    File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\jasper.jar
    MD5: ea069107d6629c11082ea4e2b7b0b828
    SHA1: f3bd2b50b6bd5498fec4e2fc867a09f4d53d6e9f
    SHA256:c1eab6618f1ea7f065266805e32eea0b0e17756fa37061e247a19c45cb32da2b
    Referenced In Project/Scope: tomcat9-config:provided

    Identifiers

    tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jaspic-api.jar

    License:

    https://www.apache.org/licenses/LICENSE-2.0.txt
    File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\jaspic-api.jar
    MD5: aa5ad909d21de42341df7b2be8bb2d7e
    SHA1: ca6f0a712a1a70c04deb4182ce06a83ba6cdd13a
    SHA256:cc766732b4f88e63aaa506197bacb44e22d68e1c02e1e529f6ca3b0b0275eed8
    Referenced In Project/Scope: tomcat9-config:provided

    Identifiers

    • cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  
    • cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  

    tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: jsp-api.jar

    License:

    https://www.apache.org/licenses/LICENSE-2.0.txt
    File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\jsp-api.jar
    MD5: 998a22421448a1b3cf75fc6e973bd081
    SHA1: 5a51d96bb3e145ce531bca18858ff31c8d90f554
    SHA256:4d10e2d83d849555dedd4eb1950ffbcfedb68c39ef9e1a6d755e03407d1a3bda
    Referenced In Project/Scope: tomcat9-config:provided

    Identifiers

    • cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  
    • cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  

    tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: sample.war

    File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\webapps\docs\appdev\sample\sample.war
    MD5: 570f196c4a1025a717269d16d11d6f37
    SHA1: 80f5053b166c69d81697ba21113c673f8372aca0
    SHA256:89b33caa5bf4cfd235f060c396cb1a5acb2734a1366db325676f48c5f5ed92e5
    Referenced In Project/Scope: tomcat9-config:provided

    Identifiers

    • None

    tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: servlet-api.jar

    License:

    https://www.apache.org/licenses/LICENSE-2.0.txt
    File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\servlet-api.jar
    MD5: a9fad69beb1bdb9b0cf4d2ac37e43048
    SHA1: 1670d55c61d0dae1920ac41133f47a20fcf31db3
    SHA256:6edd7186b4df3db9ba50f86468c74c256050d31f6394430e65f92d96752a0f9a
    Referenced In Project/Scope: tomcat9-config:provided

    Identifiers

    CVE-2002-2272  

    Tomcat 4.0 through 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 through 1.3.27, allows remote attackers to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values.
    CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

    CVSSv2:
    • Base Score: HIGH (7.8)
    • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:C

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2020-8022  

    A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.
    CWE-276 Incorrect Default Permissions

    CVSSv2:
    • Base Score: HIGH (7.2)
    • Vector: /AV:L/AC:L/Au:N/C:C/I:C/A:C
    CVSSv3:
    • Base Score: HIGH (7.8)
    • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.8/RC:R/MAV:A

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2002-1394  

    Apache Tomcat 4.0.5 and earlier, when using both the invoker servlet and the default servlet, allows remote attackers to read source code for server files or bypass certain protections, a variant of CAN-2002-1148.
    NVD-CWE-Other

    CVSSv2:
    • Base Score: HIGH (7.5)
    • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

    References:

      Vulnerable Software & Versions: (show all)

      CVE-2009-3548  

      The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
      CWE-255 Credentials Management Errors

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2013-2185  

      The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186.  NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue
      CWE-20 Improper Input Validation

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2013-4444  

      Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file.
      CWE-94 Improper Control of Generation of Code ('Code Injection')

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:
      • secalert@redhat.com - Patch

      Vulnerable Software & Versions: (show all)

      CVE-2013-6357  

      Cross-site request forgery (CSRF) vulnerability in the Manager application in Apache Tomcat 5.5.25 and earlier allows remote attackers to hijack the authentication of administrators for requests that manipulate application deployment via the POST method, as demonstrated by a /manager/html/undeploy?path= URI.  NOTE: the vendor disputes the significance of this report, stating that "the Apache Tomcat Security team has not accepted any reports of CSRF attacks against the Manager application ... as they require a reckless system administrator.
      CWE-352 Cross-Site Request Forgery (CSRF)

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2013-4286  

      Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.
      CWE-20 Improper Input Validation

      CVSSv2:
      • Base Score: MEDIUM (5.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2002-1148  

      The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
      NVD-CWE-Other

      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2002-2006  

      The default installation of Apache Tomcat 4.0 through 4.1 and 3.0 through 3.3.1 allows remote attackers to obtain the installation path and other sensitive system information via the (1) SnoopServlet or (2) TroubleShooter example servlets.
      NVD-CWE-Other

      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2003-0866  

      The Catalina org.apache.catalina.connector.http package in Tomcat 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service via several requests that do not follow the HTTP protocol, which causes Tomcat to reject later requests.
      NVD-CWE-Other

      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2008-0128  

      The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
      CWE-16 Configuration

      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:N/A:N

      References:

      Vulnerable Software & Versions:

      CVE-2014-0075  

      Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data.
      CWE-189 Numeric Errors

      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2005-4838  

      Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp.  NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.
      CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

      CVSSv2:
      • Base Score: MEDIUM (4.3)
      • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

      References:
      • secalert@redhat.com - Patch

      Vulnerable Software & Versions:

      CVE-2006-7196  

      Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors.  NOTE: this may be related to CVE-2006-0254.1.
      CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

      CVSSv2:
      • Base Score: MEDIUM (4.3)
      • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

      References:

        Vulnerable Software & Versions: (show all)

        CVE-2007-1355  

        Multiple cross-site scripting (XSS) vulnerabilities in the appdev/sample/web/hello.jsp example application in Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.23, and 6.0.0 through 6.0.10 allow remote attackers to inject arbitrary web script or HTML via the test parameter and unspecified vectors.
        NVD-CWE-Other

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2007-2449  

        Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
        NVD-CWE-Other

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

        References:
        • secalert@redhat.com - Patch

        Vulnerable Software & Versions: (show all)

        CVE-2007-3383  

        Cross-site scripting (XSS) vulnerability in SendMailServlet in the examples web application (examples/jsp/mail/sendmail.jsp) in Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.36 allows remote attackers to inject arbitrary web script or HTML via the From field and possibly other fields, related to generation of error messages.
        NVD-CWE-Other

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

        References:
        • secalert@redhat.com - Patch
        • secalert@redhat.com - Patch
        • secalert@redhat.com - Patch

        Vulnerable Software & Versions: (show all)

        CVE-2008-2938  

        Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
        CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2009-2696  

        Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.
        CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

        References:

        Vulnerable Software & Versions:

        CVE-2013-4322  

        Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544.
        CWE-20 Improper Input Validation

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:N/I:N/A:P

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2013-4590  

        Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
        CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2014-0096  

        java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
        CWE-264 Permissions, Privileges, and Access Controls

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2014-0099  

        Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
        CWE-189 Numeric Errors

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:N/I:P/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2014-0119  

        Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application.
        CWE-264 Permissions, Privileges, and Access Controls

        CVSSv2:
        • Base Score: MEDIUM (4.3)
        • Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2007-2450  

        Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
        CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

        CVSSv2:
        • Base Score: LOW (3.5)
        • Vector: /AV:N/AC:M/Au:S/C:N/I:P/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2007-5461  

        Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
        CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

        CVSSv2:
        • Base Score: LOW (3.5)
        • Vector: /AV:N/AC:M/Au:S/C:P/I:N/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2007-1358  

        Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
        CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

        CVSSv2:
        • Base Score: LOW (2.6)
        • Vector: /AV:N/AC:H/Au:N/C:N/I:P/A:N

        References:

        Vulnerable Software & Versions: (show all)

        CVE-2008-5519  

        The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
        CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

        CVSSv2:
        • Base Score: LOW (2.6)
        • Vector: /AV:N/AC:H/Au:N/C:P/I:N/A:N

        References:

        Vulnerable Software & Versions: (show all)

        tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: taglibs-standard-impl-1.2.5.jar

        Description:

                An implementation of the JSP Standard Tag Library (JSTL).
            

        License:

        http://www.apache.org/licenses/LICENSE-2.0.txt
        File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\webapps\examples\WEB-INF\lib\taglibs-standard-impl-1.2.5.jar
        MD5: 8e5c8db242fbef3db1acfcbb3bc8ec8b
        SHA1: 9b9783ccb2a323383e6e20e36d368f8997b71967
        SHA256:d075cb77d94e2d115b4d90a897b57d65cc31ed8e1b95d65361da324642705728
        Referenced In Project/Scope: tomcat9-config:provided

        Identifiers

        tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-api.jar

        License:

        https://www.apache.org/licenses/LICENSE-2.0.txt
        File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\tomcat-api.jar
        MD5: 49afc9758ba254dbfea8b2f41de56886
        SHA1: 8743982d948c4d9228af235a60416ad3375cbe84
        SHA256:96a3663747a896a587e397efb7eb64710e837eab80e54007921adbd0e2157c69
        Referenced In Project/Scope: tomcat9-config:provided

        Identifiers

        tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-i18n-cs.jar

        File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\tomcat-i18n-cs.jar
        MD5: 178a7a22e4bd3f3b513fcf22d25ee781
        SHA1: cc17b57cdab74ce400cb15e5acfa5564f5d8244e
        SHA256:ce968252d6e3dad762d3ebdec1084af69ce8791f557b08d42ba59932413819f0
        Referenced In Project/Scope: tomcat9-config:provided

        Identifiers

        • cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  
        • cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  

        tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-i18n-fr.jar

        File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\tomcat-i18n-fr.jar
        MD5: 3c8c670f321611f90dfb700188706977
        SHA1: 32a2374d8393c13120e4f6ae1dfc9aec3635f439
        SHA256:94f032f6ac04c3d7f5b5aeb36ddb83989719edc996ed8c781565f037e7e0fd3d
        Referenced In Project/Scope: tomcat9-config:provided

        Identifiers

        • cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  
        • cpe:2.3:a:apache_tomcat:apache_tomcat:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  
        • cpe:2.3:a:nfr:nfr:9.0.89:*:*:*:*:*:*:*  (Confidence:Low)  

        tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: tomcat-juli.jar

        License:

        https://www.apache.org/licenses/LICENSE-2.0.txt
        File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\bin\tomcat-juli.jar
        MD5: 24a1a83de4a7a076f1da3465c001a34f
        SHA1: 380bb0630f6d2960957e7134c45955dd43e0de99
        SHA256:6e0013ab7cd413525def74f738ccd721472bc77f4f6d4ed9a7e5827d0fa1d437
        Referenced In Project/Scope: tomcat9-config:provided

        Identifiers

        tomcat-9.0.89.tar.gz: tomcat-9.0.89.tar: websocket-api.jar

        License:

        https://www.apache.org/licenses/LICENSE-2.0.txt
        File Path: C:\Users\Jeremy\.m2\repository\org\apache\tomcat\tomcat\9.0.89\tomcat-9.0.89.tar.gz\tomcat-9.0.89.tar\apache-tomcat-9.0.89\lib\websocket-api.jar
        MD5: 5ac85460b8f7a1d1d7537f30b2e89268
        SHA1: 456d9b55dbe56806f6c7df0066f9be49dd234272
        SHA256:22958b193c46e46c7acc25da3b3c0034cb349e04144b4026b4adec726a3cff07
        Referenced In Project/Scope: tomcat9-config:provided

        Identifiers

        • None


        This report contains data retrieved from the National Vulnerability Database.
        This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
        This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
        This report may contain data retrieved from RetireJS.
        This report may contain data retrieved from the Sonatype OSS Index.