Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-34305
Severity
6.1MEDIUM
EPSS
16.9%
top 5.04%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 23
Latest updateApr 15
Description
In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages4 packages
🔴Vulnerability Details
5VulnCheck▶
Apache Tomcat Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')↗2022
💥Exploits & PoCs
2Nuclei▶
Apache Tomcat Examples Web Application - Cross-Site Scripting
Nuclei▶
Apache Tomcat - Default Login Discovery
📋Vendor Advisories
6Oracle▶
Oracle Oracle Fusion Middleware Risk Matrix: MFT Runtime Server (Apache Tomcat) — CVE-2022-34305↗2023-04-15
Oracle▶
Oracle Oracle Communications Risk Matrix: Backend Server (Apache Tomcat) — CVE-2022-34305↗2023-01-15
Oracle▶
Oracle Oracle Communications Applications Risk Matrix: REST API (Apache Tomcat) — CVE-2022-34305↗2022-10-15
Debian▶
CVE-2022-34305: tomcat9 - In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64...↗2022