Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-29885


The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.


Published

2022-05-12T08:15:07.630

Last Modified

2024-11-21T06:59:54.297

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-400
  • Type: Secondary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache tomcat ≤ 8.5.78 Yes
Application apache tomcat ≤ 9.0.62 Yes
Application apache tomcat ≤ 10.0.20 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Application apache tomcat 10.1.0 Yes
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes
Application oracle hospitality_cruise_shipboard_property_management_system 20.2.1 Yes

References