Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-23181 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Apache Tomcat Server applications / Web servers |
Vendor | Apache Foundation |
This security bulletin contains information about 1 vulnerabilities.
Updated: 28.01.2021
Updated vulnerability description, updated list of affected and and fixed versions.
EUVDB-ID: #VU60079
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-23181
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a time of check, time of use flaw when configured to persist sessions using the FileStore. A local user can perform certain actions which lead to security restrictions bypass and privilege escalation (code execution with Tomcat process privileges).
MitigationInstall updates from vendor's website.
Vulnerable software versionsApache Tomcat: 8.5.0 - 8.5.74, 9.0.0 - 9.0.56, 10.0.0 - 10.0.14, 10.1.0-M1 - 10.1.0-M9
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-10.html
http://tomcat.apache.org/security-9.html
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?