CVE-2013-2071

java/org/apache/catalina/core/AsyncContextImpl.java in Apache Tomcat 7.x before 7.0.40 does not properly handle the throwing of a RuntimeException in an AsyncListener in an application, which allows context-dependent attackers to obtain sensitive request information intended for other applications in opportunistic circumstances via an application that records the requests that it processes.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html
http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html
http://marc.info/?l=bugtraq&m=139344248911289&w=2
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372&r2=1471371&pathrev=1471372 Patch
http://svn.apache.org/viewvc?view=revision&revision=1471372 Patch
http://tomcat.apache.org/security-7.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
http://www.securityfocus.com/bid/59798
http://www.securityfocus.com/bid/64758
http://www.ubuntu.com/usn/USN-1841-1
https://issues.apache.org/bugzilla/show_bug.cgi?id=54178 Exploit
http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html
http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html
http://marc.info/?l=bugtraq&m=139344248911289&w=2
http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372&r2=1471371&pathrev=1471372 Patch
http://svn.apache.org/viewvc?view=revision&revision=1471372 Patch
http://tomcat.apache.org/security-7.html Vendor Advisory
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
http://www.securityfocus.com/bid/59798
http://www.securityfocus.com/bid/64758
http://www.ubuntu.com/usn/USN-1841-1
https://issues.apache.org/bugzilla/show_bug.cgi?id=54178 Exploit
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html - () http://archives.neohapsis.com/archives/bugtraq/2013-05/0040.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105855.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105886.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html - () http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106342.html -
References () http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html - () http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html -
References () http://marc.info/?l=bugtraq&m=139344248911289&w=2 - () http://marc.info/?l=bugtraq&m=139344248911289&w=2 -
References () http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372&r2=1471371&pathrev=1471372 - Patch () http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/core/AsyncContextImpl.java?r1=1471372&r2=1471371&pathrev=1471372 - Patch
References () http://svn.apache.org/viewvc?view=revision&revision=1471372 - Patch () http://svn.apache.org/viewvc?view=revision&revision=1471372 - Patch
References () http://tomcat.apache.org/security-7.html - Vendor Advisory () http://tomcat.apache.org/security-7.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html - () http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html -
References () http://www.securityfocus.com/bid/59798 - () http://www.securityfocus.com/bid/59798 -
References () http://www.securityfocus.com/bid/64758 - () http://www.securityfocus.com/bid/64758 -
References () http://www.ubuntu.com/usn/USN-1841-1 - () http://www.ubuntu.com/usn/USN-1841-1 -
References () https://issues.apache.org/bugzilla/show_bug.cgi?id=54178 - Exploit () https://issues.apache.org/bugzilla/show_bug.cgi?id=54178 - Exploit

Information

Published : 2013-06-01 14:21

Updated : 2024-11-21 01:50


NVD link : CVE-2013-2071

Mitre link : CVE-2013-2071

CVE.ORG link : CVE-2013-2071


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor