Description:
Apache Software Foundation has released a security advisory to address a vulnerability in the Apache Tomcat. A local attacker could exploit the vulnerability in the Tomcat server used FileStore for session persistence by sending a specially crafted request.
Affected Systems:
- Apache Tomcat 10.1.0-M1 to 10.1.0-M8
- Apache Tomcat 10.0.0-M5 to 10.0.14
- Apache Tomcat 9.0.35 to 9.0.56
- Apache Tomcat 8.5.55 to 8.5.73
Impact:
A successful exploitation of the vulnerability could lead to privilege escalation on an affected system.
Recommendation:
Apache Software Foundation has released new version of the products to address the issue and they can be downloaded at the following URLs:
- https://tomcat.apache.org/download-80.cgi#8.5.75
- https://tomcat.apache.org/download-90.cgi#9.0.58
- https://tomcat.apache.org/download-10.cgi#10.0.16
- https://tomcat.apache.org/download-10.cgi#10.1.0-M10
More Information:
- https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.75
- https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.58
- https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.16
- https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M10
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23181