CVE-2011-2526

MEDIUM

Description

Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.

References

http://marc.info/?l=bugtraq&m=132215163318824&w=2

http://marc.info/?l=bugtraq&m=133469267822771&w=2

http://marc.info/?l=bugtraq&m=136485229118404&w=2

http://marc.info/?l=bugtraq&m=139344343412337&w=2

http://osvdb.org/73797

http://osvdb.org/73798

http://rhn.redhat.com/errata/RHSA-2012-0074.html

http://rhn.redhat.com/errata/RHSA-2012-0075.html

http://rhn.redhat.com/errata/RHSA-2012-0076.html

http://rhn.redhat.com/errata/RHSA-2012-0077.html

http://rhn.redhat.com/errata/RHSA-2012-0078.html

http://rhn.redhat.com/errata/RHSA-2012-0325.html

http://secunia.com/advisories/45232

http://secunia.com/advisories/48308

http://secunia.com/advisories/57126

http://svn.apache.org/viewvc?view=revision&revision=1145383

http://svn.apache.org/viewvc?view=revision&revision=1145571

http://svn.apache.org/viewvc?view=revision&revision=1145694

http://svn.apache.org/viewvc?view=revision&revision=1146005

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://tomcat.apache.org/security-7.html

http://www.debian.org/security/2012/dsa-2401

http://www.mandriva.com/security/advisories?name=MDVSA-2011:156

http://www.securityfocus.com/archive/1/518889/100/0/threaded

http://www.securityfocus.com/bid/48667

http://www.securitytracker.com/id?1025788

https://bugzilla.redhat.com/show_bug.cgi?id=720948

https://exchange.xforce.ibmcloud.com/vulnerabilities/68541

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14573

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19514

Details

Source: MITRE

Published: 2011-07-14

Updated: 2019-03-25

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 4.4

Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.4

Severity: MEDIUM