7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
6.3 Medium
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.1%
Moderate: Open redirect CVE-2023-41080
If the ROOT (default) web application is configured to use FORM authentication then it is possible that a specially crafted URL could be used to trigger a redirect to an URL of the attackers choice.
This was fixed with commit e3703c9a.
This issue was reported to the Tomcat Security Team on 17 August 2023. The issue was made public on 22 August 2023.
Affects: 11.0.0-M1 to 11.0.0-M10
Important: Request smuggling CVE-2023-46589
Tomcat did not correctly parse HTTP trailer headers. A specially crafted trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy.
This was fixed with commit 6f181e10.
This issue was reported to the Tomcat Security Team on 20 October 2023. The issue was made public on 28 November 2023.
Affects: 11.0.0-M1 to 11.0.0-M10
CPE | Name | Operator | Version |
---|---|---|---|
apache tomcat | ge | 11.0.0-M1 | |
apache tomcat | le | 11.0.0-M10 |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
6.3 Medium
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.1%