Description:
Apache Software Foundation has released a security advisory to address multiple vulnerabilities in the Apache Tomcat. A remote attacker could exploit a previously incomplete fix by sending a specially crafted request. On a certain occasion, responses of h2c connection requests could be mixed up, allowing a user to see results of other users’ requests.
Affected Systems:
- Apache Tomcat 10.0.0.M1 to 10.0.0
- Apache Tomcat 9.0.0.M1 to 9.0.41
- Apache Tomcat 8.5.0 to 8.5.61
- Apache Tomcat 7.0.0 to 7.0.107
Impact:
A successful exploitation of the vulnerabilities could lead to information disclosure or arbitrary code execution on an affected system.
Recommendation:
Apache Software Foundation has released new versions of the products to address the issue and they can be downloaded at the following URLs:
- https://tomcat.apache.org/download-70.cgi#7.0.108
- https://tomcat.apache.org/download-80.cgi#8.5.63
- https://tomcat.apache.org/download-90.cgi#9.0.43
- https://tomcat.apache.org/download-10.cgi#10.0.2
More Information:
- https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108
- https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
- https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
- https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
- https://www.hkcert.org/security-bulletin/apache-tomcat-multiple-vulnerabilities_20210303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329