CVE-2022-45143

The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.83:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone13:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone14:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone15:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone16:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone17:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone6:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone7:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone8:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone9:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 07:28

Type Values Removed Values Added
Summary
  • (es) JsonErrorReportValve en Apache Tomcat 8.5.83, 9.0.40 a 9.0.68 y 10.1.0-M1 a 10.1.1 no escapó de los valores de tipo, mensaje o descripción. En algunas circunstancias, estos se construyen a partir de datos proporcionados por el usuario y, por lo tanto, era posible que los usuarios proporcionaran valores que invalidaban o manipulaban la salida JSON.
References
  • () https://security.netapp.com/advisory/ntap-20230216-0009/ -
References () https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj - Mailing List, Vendor Advisory () https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj - Mailing List, Vendor Advisory
References () https://security.gentoo.org/glsa/202305-37 - Third Party Advisory () https://security.gentoo.org/glsa/202305-37 - Third Party Advisory

27 Jun 2023, 02:42

Type Values Removed Values Added
CWE CWE-74 CWE-116
References (MISC) https://security.gentoo.org/glsa/202305-37 - (MISC) https://security.gentoo.org/glsa/202305-37 - Third Party Advisory

30 May 2023, 06:15

Type Values Removed Values Added
References
  • (MISC) https://security.gentoo.org/glsa/202305-37 -

Information

Published : 2023-01-03 19:15

Updated : 2024-11-21 07:28


NVD link : CVE-2022-45143

Mitre link : CVE-2022-45143

CVE.ORG link : CVE-2022-45143


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-116

Improper Encoding or Escaping of Output