9.7 High
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
54.2%
org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x
before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the
cross-site request forgery (CSRF) protection mechanism via a request that
lacks a session identifier.
Author | Note |
---|---|
seth-arnold | tomcat6 on 10.04 LTS does not have this file nor function: the CSRF protection was consolidated after 10.04 LTS. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 11.10 | noarch | tomcat6 | <Β 6.0.32-5ubuntu1.4 | UNKNOWN |
ubuntu | 12.04 | noarch | tomcat6 | <Β 6.0.35-1ubuntu3.2 | UNKNOWN |
ubuntu | 12.10 | noarch | tomcat6 | <Β 6.0.35-5ubuntu0.1 | UNKNOWN |
ubuntu | 11.10 | noarch | tomcat7 | <Β 7.0.21-1ubuntu0.1 | UNKNOWN |
ubuntu | 12.04 | noarch | tomcat7 | <Β 7.0.26-1ubuntu1.2 | UNKNOWN |
ubuntu | 12.10 | noarch | tomcat7 | <Β 7.0.30-0ubuntu1.1 | UNKNOWN |
archives.neohapsis.com/archives/bugtraq/2012-12/0045.html
tomcat.apache.org/security-6.html
tomcat.apache.org/security-7.html
launchpad.net/bugs/cve/CVE-2012-4431
nvd.nist.gov/vuln/detail/CVE-2012-4431
security-tracker.debian.org/tracker/CVE-2012-4431
ubuntu.com/security/notices/USN-1685-1
www.cve.org/CVERecord?id=CVE-2012-4431