Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2022-23181

Published: 27 January 2022

The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.

Priority

Low

Cvss 3 Severity Score

7.0

Score breakdown

Status

Package Release Status
tomcat8
Launchpad, Ubuntu, Debian
bionic Needs triage

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needs triage

tomcat9
Launchpad, Ubuntu, Debian
bionic Needs triage

focal Needs triage

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Ignored
(end of standard support)
impish Ignored
(end of life)
kinetic Ignored
(end of life, was needs-triage)
jammy Needs triage

lunar Needs triage

mantic Needs triage

Severity score breakdown

Parameter Value
Base score 7.0
Attack vector Local
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H