Skip to main content

Apache Tomcat Request Object Recycle Security Bypass Vulnerability

Last Update Date: 18 Jan 2012 14:30 Release Date: 18 Jan 2012 4913 Views

RISK: Medium Risk

TYPE: Servers - Internet App Servers

TYPE: Internet App Servers

A security issue has been identified in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions.  The security issue is caused due to the request object not being recycled before processing the next request when logging certain actions. This can lead to e.g. the remote IP address and HTTP headers being carried forward to the next request and certain policies being bypassed.


Impact

  • Security Restriction Bypass

System / Technologies affected

  • Apache Tomcat 6.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 6.0.35 or later.

Vulnerability Identifier


Source


Related Link