5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
60.6%
When serving resources from a network location using the NTFS file system,
Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to
8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure
in some configurations. The root cause was the unexpected behaviour of the
JRE API File.getCanonicalPath() which in turn was caused by the
inconsistent behaviour of the Windows API (FindFirstFileW) in some
circumstances.
Author | Note |
---|---|
leosilva | tomcat6 is out of support , marking tomcat6 for precise as ignored. |
mdeslaur | probably windows-specific, setting to negligible |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | tomcat6 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tomcat6 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tomcat7 | < any | UNKNOWN |
ubuntu | 14.04 | noarch | tomcat7 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tomcat7 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tomcat8 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tomcat8 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tomcat9 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | tomcat9 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | tomcat9 | < any | UNKNOWN |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122
launchpad.net/bugs/cve/CVE-2021-24122
lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2021-24122
security-tracker.debian.org/tracker/CVE-2021-24122
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
60.6%