Lucene search

K
cveApacheCVE-2020-13935
HistoryJul 14, 2020 - 3:15 p.m.

CVE-2020-13935

2020-07-1415:15:11
CWE-835
apache
web.nvd.nist.gov
725
apache tomcat
cve-2020-13935
websocket
payload length
validation
denial of service
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.148

Percentile

95.8%

The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.

Affected configurations

Nvd
Vulners
Node
apachetomcatRange7.0.277.0.104
OR
apachetomcatRange8.5.08.5.56
OR
apachetomcatRange9.0.19.0.36
OR
apachetomcatMatch9.0.0milestone1
OR
apachetomcatMatch9.0.0milestone10
OR
apachetomcatMatch9.0.0milestone11
OR
apachetomcatMatch9.0.0milestone12
OR
apachetomcatMatch9.0.0milestone13
OR
apachetomcatMatch9.0.0milestone14
OR
apachetomcatMatch9.0.0milestone15
OR
apachetomcatMatch9.0.0milestone16
OR
apachetomcatMatch9.0.0milestone17
OR
apachetomcatMatch9.0.0milestone18
OR
apachetomcatMatch9.0.0milestone19
OR
apachetomcatMatch9.0.0milestone2
OR
apachetomcatMatch9.0.0milestone20
OR
apachetomcatMatch9.0.0milestone21
OR
apachetomcatMatch9.0.0milestone22
OR
apachetomcatMatch9.0.0milestone23
OR
apachetomcatMatch9.0.0milestone24
OR
apachetomcatMatch9.0.0milestone25
OR
apachetomcatMatch9.0.0milestone26
OR
apachetomcatMatch9.0.0milestone27
OR
apachetomcatMatch9.0.0milestone3
OR
apachetomcatMatch9.0.0milestone4
OR
apachetomcatMatch9.0.0milestone5
OR
apachetomcatMatch9.0.0milestone6
OR
apachetomcatMatch9.0.0milestone7
OR
apachetomcatMatch9.0.0milestone8
OR
apachetomcatMatch9.0.0milestone9
OR
apachetomcatMatch10.0.0milestone1
OR
apachetomcatMatch10.0.0milestone2
OR
apachetomcatMatch10.0.0milestone3
OR
apachetomcatMatch10.0.0milestone4
OR
apachetomcatMatch10.0.0milestone5
OR
apachetomcatMatch10.0.0milestone6
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
netapponcommand_system_managerRange3.0.03.1.3
Node
opensuseleapMatch15.1
OR
opensuseleapMatch15.2
Node
canonicalubuntu_linuxMatch16.04esm
OR
canonicalubuntu_linuxMatch20.04lts
Node
mcafeeepolicy_orchestratorMatch5.9.0
OR
mcafeeepolicy_orchestratorMatch5.9.1
OR
mcafeeepolicy_orchestratorMatch5.10.0-
OR
mcafeeepolicy_orchestratorMatch5.10.0update_1
OR
mcafeeepolicy_orchestratorMatch5.10.0update_2
OR
mcafeeepolicy_orchestratorMatch5.10.0update_3
OR
mcafeeepolicy_orchestratorMatch5.10.0update_4
OR
mcafeeepolicy_orchestratorMatch5.10.0update_5
OR
mcafeeepolicy_orchestratorMatch5.10.0update_6
OR
mcafeeepolicy_orchestratorMatch5.10.0update_7
OR
mcafeeepolicy_orchestratorMatch5.10.0update_8
Node
oracleagile_engineering_data_managementMatch6.2.1.0
OR
oracleagile_plmMatch9.3.3
OR
oracleagile_plmMatch9.3.5
OR
oracleagile_plmMatch9.3.6
OR
oracleblockchain_platformRange<21.1.2
OR
oraclecommerce_guided_searchMatch11.3.2
OR
oraclecommunications_cloud_native_core_policyMatch1.14.0
OR
oraclecommunications_instant_messaging_serverMatch10.0.1.5.0
OR
oraclefmw_platformMatch12.2.1.3.0
OR
oraclefmw_platformMatch12.2.1.4.0
OR
oracleinstantis_enterprisetrackMatch17.1
OR
oracleinstantis_enterprisetrackMatch17.2
OR
oracleinstantis_enterprisetrackMatch17.3
OR
oraclemanaged_file_transferMatch12.2.1.3.0
OR
oraclemanaged_file_transferMatch12.2.1.4.0
OR
oraclemysql_enterprise_monitorRange8.0.21
OR
oraclesiebel_ui_frameworkRange20.12
OR
oracleworkload_managerMatch12.2.0.1
OR
oracleworkload_managerMatch18c
OR
oracleworkload_managerMatch19c
VendorProductVersionCPE
apachetomcat*cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*
apachetomcat9.0.0cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*
Rows per page:
1-10 of 721

CNA Affected

[
  {
    "product": "Apache Tomcat",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56, 7.0.27 to 7.0.104"
      }
    ]
  }
]

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.148

Percentile

95.8%