BIT-tomcat-2020-9484

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/tomcat/BIT-tomcat-2020-9484.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-tomcat-2020-9484
Aliases
Published
2024-03-06T11:10:32.165Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

References

Affected packages

Bitnami / tomcat

Package

Name
tomcat
Purl
pkg:bitnami/tomcat

Severity

  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
7.0.0
Fixed
7.0.108
Introduced
8.5.0
Fixed
8.5.63
Introduced
9.0.1
Fixed
9.0.43
Type
SEMVER
Events
Introduced
9.0.0-milestone1
Last affected
9.0.0-milestone1
Introduced
9.0.0-milestone10
Last affected
9.0.0-milestone10
Introduced
9.0.0-milestone11
Last affected
9.0.0-milestone11
Introduced
9.0.0-milestone12
Last affected
9.0.0-milestone12
Introduced
9.0.0-milestone13
Last affected
9.0.0-milestone13
Introduced
9.0.0-milestone14
Last affected
9.0.0-milestone14
Introduced
9.0.0-milestone15
Last affected
9.0.0-milestone15
Introduced
9.0.0-milestone16
Last affected
9.0.0-milestone16
Introduced
9.0.0-milestone17
Last affected
9.0.0-milestone17
Introduced
9.0.0-milestone18
Last affected
9.0.0-milestone18
Introduced
9.0.0-milestone19
Last affected
9.0.0-milestone19
Introduced
9.0.0-milestone2
Last affected
9.0.0-milestone2
Introduced
9.0.0-milestone20
Last affected
9.0.0-milestone20
Introduced
9.0.0-milestone21
Last affected
9.0.0-milestone21
Introduced
9.0.0-milestone22
Last affected
9.0.0-milestone22
Introduced
9.0.0-milestone23
Last affected
9.0.0-milestone23
Introduced
9.0.0-milestone24
Last affected
9.0.0-milestone24
Introduced
9.0.0-milestone25
Last affected
9.0.0-milestone25
Introduced
9.0.0-milestone26
Last affected
9.0.0-milestone26
Introduced
9.0.0-milestone27
Last affected
9.0.0-milestone27
Introduced
9.0.0-milestone3
Last affected
9.0.0-milestone3
Introduced
9.0.0-milestone4
Last affected
9.0.0-milestone4
Introduced
9.0.0-milestone5
Last affected
9.0.0-milestone5
Introduced
9.0.0-milestone6
Last affected
9.0.0-milestone6
Introduced
9.0.0-milestone7
Last affected
9.0.0-milestone7
Introduced
9.0.0-milestone8
Last affected
9.0.0-milestone8
Introduced
9.0.0-milestone9
Last affected
9.0.0-milestone9
Introduced
10.0.0-milestone1
Last affected
10.0.0-milestone1
Introduced
10.0.0-milestone2
Last affected
10.0.0-milestone2
Introduced
10.0.0-milestone3
Last affected
10.0.0-milestone3
Introduced
10.0.0-milestone4
Last affected
10.0.0-milestone4