Information Exposure

Affecting org.apache.tomcat:tomcat-catalina artifact, versions [7,7.0.74) || [8.5.0,8.5.9) || [8.0.0RC1,8.0.40) || [9.0.0M1,9.0.0M15)

Do your applications use this vulnerable package? Test your applications

Overview

org.apache.tomcat:tomcat-catalina is a Tomcat Servlet Engine Core Classes and Standard implementations.

Affected versions of this package are vulnerable to Information Exposure. The refactoring of the Connector code for 8.5.x onwards introduced a regression in the error handling of the send file code for the NIO HTTP connector. An error during send file processing resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body.

Remediation

Upgrade org.apache.tomcat:tomcat-catalina to version 7.0.74, 8.5.9, 8.0.40, 9.0.0M15 or higher.

References

CVSS Score

7.5
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Credit
Unknown
CVE
CVE-2016-8745
CWE
CWE-200
Snyk ID
SNYK-JAVA-ORGAPACHETOMCAT-451522
Disclosed
13 Dec, 2016
Published
13 Dec, 2016