CVE-2020-13935

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.

References

https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E

https://www.debian.org/security/2020/dsa-4727

https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html

https://security.netapp.com/advisory/ntap-20200724-0003/

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html

https://usn.ubuntu.com/4448-1/

https://kc.mcafee.com/corporate/index?page=content&id=SB10332

https://www.oracle.com/security-alerts/cpuoct2020.html

https://usn.ubuntu.com/4596-1/

https://lists.apache.org/thread.html/[email protected]%3Cusers.tomcat.apache.org%3E

https://www.oracle.com/security-alerts/cpujan2021.html

https://www.oracle.com/security-alerts/cpuApr2021.html

https://www.oracle.com//security-alerts/cpujul2021.html

https://www.oracle.com/security-alerts/cpuoct2021.html

Details

Source: MITRE

Published: 2020-07-14

Updated: 2021-10-20

Type: CWE-835

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 7.0.27 to 7.0.104 (inclusive)

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 8.5.0 to 8.5.56 (inclusive)

cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 9.0.1 to 9.0.36 (inclusive)

cpe:2.3:a:apache:tomcat:10.0.0:milestone1:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone2:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone3:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone4:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone5:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.0:milestone6:*:*:*:*:*:*

Tenable Plugins

View all (35 total)

IDNameProductFamilySeverity
150936Apache Tomcat 10.0.0.M1 < 10.0.0.M7 multiple vulnerabilitiesNessusWeb Servers
high
147719JFrog < 7.7.0 Multiple VulnerabilitiesNessusMisc.
high
147349NewStart CGSL CORE 5.04 / MAIN 5.04 : tomcat Multiple Vulnerabilities (NS-SA-2021-0028)NessusNewStart CGSL Local Security Checks
medium
145246Oracle Business Process Management Suite (Jan 2021 CPU)NessusMisc.
critical
142299EulerOS 2.0 SP2 : tomcat (EulerOS-SA-2020-2401)NessusHuawei Local Security Checks
high
142134EulerOS 2.0 SP5 : tomcat (EulerOS-SA-2020-2274)NessusHuawei Local Security Checks
high
141862Ubuntu 20.04 LTS : Tomcat vulnerabilities (USN-4596-1)NessusUbuntu Local Security Checks
high
141847MySQL Enterprise Monitor 8.0.x < 8.0.22.1262 DoS (Oct 2020 CPU)NessusCGI abuses
high
141833McAfee ePolicy Orchestrator (SB10332)NessusWindows
medium
141829Oracle Database Server Multiple Vulnerabilities (Oct 2020 CPU)NessusDatabases
critical
141699Scientific Linux Security Update : tomcat on SL7.x x86_64 (20201001)NessusScientific Linux Local Security Checks
high
141616CentOS 7 : tomcat (CESA-2020:4004)NessusCentOS Local Security Checks
high
141038RHEL 7 : tomcat (RHSA-2020:4004)NessusRed Hat Local Security Checks
high
140860EulerOS 2.0 SP3 : tomcat (EulerOS-SA-2020-2093)NessusHuawei Local Security Checks
high
112558Apache Tomcat 7.0.x < 7.0.105 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112557Apache Tomcat 8.5.x < 8.5.57 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112549Apache Tomcat 9.0.0.M1 < 9.0.37 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
112548Apache Tomcat 10.0.0-M1 < 10.0.0-M7 Denial of ServiceWeb Application ScanningComponent Vulnerability
high
139460RHEL 5 : Red Hat JBoss Enterprise Application Platform 6.4 (RHSA-2020:3383)NessusRed Hat Local Security Checks
high
139368Ubuntu 16.04 LTS : Tomcat vulnerabilities (USN-4448-1)NessusUbuntu Local Security Checks
medium
139323RHEL 6 : Red Hat JBoss Web Server 3.1 Service Pack 10 (RHSA-2020:3303)NessusRed Hat Local Security Checks
medium
139320RHEL 6 : Red Hat JBoss Web Server 5.3.2 (RHSA-2020:3306)NessusRed Hat Local Security Checks
high
139221openSUSE Security Update : tomcat (openSUSE-2020-1111)NessusSuSE Local Security Checks
high
139159EulerOS 2.0 SP8 : tomcat (EulerOS-SA-2020-1829)NessusHuawei Local Security Checks
high
139089Amazon Linux AMI : tomcat8 (ALAS-2020-1409)NessusAmazon Linux Local Security Checks
high
139052Photon OS 2.0: Apache PHSA-2020-2.0-0265NessusPhotonOS Local Security Checks
high
139046Photon OS 1.0: Apache PHSA-2020-1.0-0309NessusPhotonOS Local Security Checks
high
139021openSUSE Security Update : tomcat (openSUSE-2020-1102)NessusSuSE Local Security Checks
high
138923FreeBSD : Apache Tomcat -- Multiple Vulnerabilities (6a72eff7-ccd6-11ea-9172-4c72b94353b5)NessusFreeBSD Local Security Checks
high
138859Debian DLA-2286-1 : tomcat8 security updateNessusDebian Local Security Checks
high
138851Apache Tomcat 7.0.x < 7.0.105 WebSocket DoSNessusWeb Servers
high
138816Photon OS 3.0: Apache PHSA-2020-3.0-0116NessusPhotonOS Local Security Checks
high
138647Debian DSA-4727-1 : tomcat9 - security updateNessusDebian Local Security Checks
high
138591Apache Tomcat 9.0.0.M1 < 9.0.37 Multiple VulnerabilitiesNessusWeb Servers
high
138574Apache Tomcat 8.5.0 < 8.5.57 Multiple VulnerabilitiesNessusWeb Servers
high