Apache Tomcat allows remote attackers to bypass a CSRF protection mechanism by using a token
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 8, 2023
Package
Affected versions
< 7.0.68
>= 8.0.0, < 8.0.31
>= 9.0.0.M0, < 9.0.0.M2
Patched versions
7.0.68
8.0.31
9.0.0.M2
Description
Published by the National Vulnerability Database
Feb 25, 2016
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Dec 8, 2023
Last updated
Dec 8, 2023
The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
References