org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier.
{
"github_reviewed_at": "2022-07-13T21:29:42Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-352"
],
"nvd_published_at": "2012-12-19T11:55:00Z",
"severity": "MODERATE"
}