7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
21.7%
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat
10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to
7.0.107 with a configuration edge case that was highly unlikely to be used,
the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both
the previously published prerequisites for CVE-2020-9484 and the previously
published mitigations for CVE-2020-9484 also apply to this issue.
Author | Note |
---|---|
leosilva | tomcat6 is out of support , marking tomcat6 for precise as ignored. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | tomcat6 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tomcat6 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tomcat7 | < any | UNKNOWN |
ubuntu | 14.04 | noarch | tomcat7 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tomcat7 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tomcat8 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | tomcat8 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | tomcat9 | < 9.0.16-3ubuntu0.18.04.2 | UNKNOWN |
ubuntu | 20.04 | noarch | tomcat9 | < 9.0.31-1ubuntu0.2 | UNKNOWN |
ubuntu | 22.04 | noarch | tomcat9 | < any | UNKNOWN |
www.openwall.com/lists/oss-security/2021/03/01/2
launchpad.net/bugs/cve/CVE-2021-25329
lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2021-25329
security-tracker.debian.org/tracker/CVE-2021-25329
ubuntu.com/security/notices/USN-5360-1
www.cve.org/CVERecord?id=CVE-2021-25329
www.openwall.com/lists/oss-security/2021/03/01/2
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
21.7%