Apache Tomcat Request Object Recycle Security Bypass Vulnerability
RISK: Medium Risk
TYPE: Servers - Internet App Servers
A security issue has been identified in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to the request object not being recycled before processing the next request when logging certain actions. This can lead to e.g. the remote IP address and HTTP headers being carried forward to the next request and certain policies being bypassed.
Impact
- Security Restriction Bypass
System / Technologies affected
- Apache Tomcat 6.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 6.0.35 or later.
Vulnerability Identifier
Source
Related Link
Share with