Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Debian: Security Advisory for tomcat9 (DSA-4952-1)
Information
Severity
Severity
Medium
Family
Family
Debian Local Security Checks
CVSSv2 Base
CVSSv2 Base
5.8
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:P/A:N
Solution Type
Solution Type
Vendor Patch
Created
Created
2 years ago
Modified
Modified
2 years ago
Summary
The remote host is missing an update for the 'tomcat9' package(s) announced via the DSA-4952-1 advisory.
Insight
Insight
Two vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in HTTP request smuggling, bypass of logout restrictions or authentications using variations of a valid user name.
Affected Software
Affected Software
'tomcat9' package(s) on Debian Linux.
Detection Method
Detection Method
Checks if a vulnerable package version is present on the target host.
Solution
Solution
For the stable distribution (buster), these problems have been fixed in version 9.0.31-1~deb10u5. We recommend that you upgrade your tomcat9 packages.