ghsa-5x5f-9r6q-q7mh
Vulnerability from github
Published
2022-05-01 23:27
Modified
2024-02-09 15:25
Summary
Apache Tomcat Sensitive Information Disclosure
Details
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "fixed": "6.0.16" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2008-0002" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": true, "github_reviewed_at": "2024-02-09T15:25:51Z", "nvd_published_at": "2008-02-12T01:00:00Z", "severity": "MODERATE" }, "details": "Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.", "id": "GHSA-5x5f-9r6q-q7mh", "modified": "2024-02-09T15:25:52Z", "published": "2022-05-01T23:27:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0002" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://web.archive.org/web/20080214133036/http://secunia.com/advisories/28915" }, { "type": "WEB", "url": "https://web.archive.org/web/20080715062302/http://secunia.com/advisories/29711" }, { "type": "WEB", "url": "https://web.archive.org/web/20080724052339/http://secunia.com/advisories/28834" }, { "type": "WEB", "url": "https://web.archive.org/web/20081012021650/http://www.securityfocus.com/bid/27703" }, { "type": "WEB", "url": "https://web.archive.org/web/20081013050642/http://secunia.com/advisories/32222" }, { "type": "WEB", "url": "https://web.archive.org/web/20081120062646/http://securityreason.com/securityalert/3638" }, { "type": "WEB", "url": "https://web.archive.org/web/20081121133027/http://www.securityfocus.com/archive/1/487812/100/0/threaded" }, { "type": "WEB", "url": "https://web.archive.org/web/20091125140215/http://secunia.com/advisories/37460" }, { "type": "WEB", "url": "https://web.archive.org/web/20120825080137/http://www.securityfocus.com/bid/31681" }, { "type": "WEB", "url": "https://web.archive.org/web/20140723000733/http://secunia.com/advisories/57126" }, { "type": "WEB", "url": "https://web.archive.org/web/20150621204350/http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=139344343412337\u0026w=2" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200804-10.xml" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3216" }, { "type": "WEB", "url": "http://tomcat.apache.org/security-6.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" } ], "schema_version": "1.4.0", "severity": [], "summary": "Apache Tomcat Sensitive Information Disclosure" }
Loading...