Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-29885

Severity
7.5HIGH
EPSS
55.5%
top 1.92%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 12
Latest updateAug 1

Description

The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

Mavenorg.apache.tomcat:tomcat10.1.0-M110.1.0-M15+3
NVDapache/tomcat8.5.388.5.78+3
Debiantomcat9< 9.0.43-2~deb11u4+3

Also affects: Debian Linux 10.0, 11.0

Patches

🔴Vulnerability Details

4
OSV
Apache Tomcat EncryptInterceptor error leads to Uncontrolled Resource Consumption2022-05-13
GHSA
Apache Tomcat EncryptInterceptor error leads to Uncontrolled Resource Consumption2022-05-13
OSV
CVE-2022-29885: The documentation of Apache Tomcat 102022-05-12
CVEList
EncryptInterceptor does not provide complete protection on insecure networks2022-05-12

💥Exploits & PoCs

1
Exploit-DB
Apache Tomcat 10.1 - Denial Of Service2023-04-05

📋Vendor Advisories

6
Ubuntu
Tomcat vulnerabilities2024-08-01
Oracle
Oracle Oracle Communications Risk Matrix: BEServer (Apache Tomcat) — CVE-2022-298852022-10-15
Oracle
Oracle Oracle Hospitality Applications Risk Matrix: Next-Gen SPMS (Apache Tomcat) — CVE-2022-298852022-07-15
Red Hat
tomcat: EncryptInterceptor documentation mistake2022-05-10
Debian
CVE-2022-29885: tomcat9 - The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20...2022
CVE-2022-29885 (HIGH CVSS 7.5) | The documentation of Apache Tomcat | cvebase.io