Apache Tomcat vulnerabilities

235 known vulnerabilities affecting apache/tomcat.

Total CVEs
235
CISA KEV
6
actively exploited
Public exploits
50
Exploited in wild
5
Severity breakdown
CRITICAL13HIGH74MEDIUM133LOW15

Vulnerabilities

Page 2 of 12
CVE-2024-54677MEDIUMCVSS 5.3≥ 9.0.0, < 9.0.98≥ 10.1.0, < 10.1.34+1 more2024-12-17
CVE-2024-54677 [MEDIUM] CWE-400 CVE-2024-54677: Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97. The following versions were EOL at the time the CVE was created but are known to be aff
nvd
CVE-2024-52316CRITICALCVSS 9.8≥ 9.0.0, < 9.0.96≥ 10.1.0, < 10.1.31+1 more2024-11-18
CVE-2024-52316 [CRITICAL] CWE-391 CVE-2024-52316: Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Ja Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to by
nvd
CVE-2024-52318MEDIUMCVSS 6.1v9.0.96v10.1.31+1 more2024-11-18
CVE-2024-52318 [MEDIUM] CWE-326 CVE-2024-52318: Incorrect object recycling and reuse vulnerability in Apache Tomcat. This issue affects Apache Tomc Incorrect object recycling and reuse vulnerability in Apache Tomcat. This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96. Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue.
nvd
CVE-2024-52317MEDIUMCVSS 6.5≥ 9.0.92, < 9.0.96≥ 10.1.27, < 10.1.31+1 more2024-11-18
CVE-2024-52317 [MEDIUM] CWE-326 CVE-2024-52317: Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the re Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommen
nvd
CVE-2024-38286HIGHCVSS 7.5≥ 9.0.13, < 9.0.90≥ 10.1.1, < 10.1.25+2 more2024-11-07
CVE-2024-38286 [HIGH] CWE-770 CVE-2024-38286: Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue aff Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through
nvd
CVE-2024-34750HIGHCVSS 7.5≥ 9.0.0, < 9.0.90≥ 10.1.0, < 10.1.25+1 more2024-07-03
CVE-2024-34750 [HIGH] CWE-400 CVE-2024-34750: Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apac Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections
nvd
CVE-2024-24549HIGHCVSS 7.5≥ 8.5.0, < 8.5.99≥ 9.0.0, < 9.0.86+2 more2024-03-13
CVE-2024-24549 [HIGH] CWE-20 CVE-2024-24549: Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomca Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through
nvd
CVE-2024-23672MEDIUMCVSS 6.3≥ 8.5.0, < 8.5.99≥ 9.0.0, < 9.0.86+2 more2024-03-13
CVE-2024-23672 [MEDIUM] CWE-459 CVE-2024-23672: Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSock Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Olde
nvd
CVE-2024-21733MEDIUMCVSS 5.3≥ 8.5.7, < 8.5.64≥ 9.0.1, < 9.0.44+1 more2024-01-19
CVE-2024-21733 [MEDIUM] CWE-209 CVE-2024-21733: Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This iss Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Other, EOL versions may also be affected. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.
nvd
CVE-2023-46589HIGHCVSS 7.5≥ 8.5.0, < 8.5.96≥ 9.0.0, < 9.0.83+2 more2023-11-28
CVE-2023-46589 [HIGH] CWE-444 CVE-2023-46589: Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, f Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple request
nvd
CVE-2023-44487HIGHCVSS 7.5KEVPoC≥ 8.5.0, ≤ 8.5.93≥ 9.0.0, ≤ 9.0.80+2 more2023-10-10
CVE-2023-44487 [HIGH] CWE-400 CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancell The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
nvd
CVE-2023-42794MEDIUMCVSS 5.9≥ 8.5.85, < 8.5.94≥ 9.0.70, < 9.0.812023-10-10
CVE-2023-42794 [MEDIUM] CWE-459 CVE-2023-42794: Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the
nvd
CVE-2023-42795MEDIUMCVSS 5.3≥ 8.5.0, < 8.5.94≥ 9.0.1, < 9.0.81+4 more2023-10-10
CVE-2023-42795 [MEDIUM] CWE-459 CVE-2023-42795: Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the curren
nvd
CVE-2023-45648MEDIUMCVSS 5.3PoC≥ 8.5.0, < 8.5.94≥ 9.0.1, < 9.0.81+4 more2023-10-10
CVE-2023-45648 [MEDIUM] CWE-20 CVE-2023-45648: Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, f Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leadin
nvd
CVE-2023-41080MEDIUMCVSS 6.1≥ 8.5.0, ≤ 8.5.92≥ 9.0.0, ≤ 9.0.79+2 more2023-08-25
CVE-2023-41080 [MEDIUM] CWE-601 CVE-2023-41080: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apa URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. Older, EOL versions may also be affected. The vulnerability is limited to the
nvd
CVE-2023-34981HIGHCVSS 7.5v8.5.88v9.0.74+2 more2023-06-21
CVE-2023-34981 [HIGH] CWE-732 CVE-2023-34981: A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant th A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an informat
nvd
CVE-2023-28709HIGHCVSS 7.5≥ 8.5.85, ≤ 8.5.87≥ 9.0.71, ≤ 9.0.73+2 more2023-05-22
CVE-2023-28709 [HIGH] CVE-2023-28709: The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7 The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query
nvd
CVE-2023-28708MEDIUMCVSS 4.3≥ 8.5.0, < 8.5.86fixed in 9.0.72+2 more2023-03-22
CVE-2023-28708 [MEDIUM] CWE-523 CVE-2023-28708: When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include t When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting
nvd
CVE-2022-45143HIGHCVSS 7.5≥ 9.0.40, < 9.0.69v8.5.83+2 more2023-01-03
CVE-2022-45143 [HIGH] CWE-116 CVE-2022-45143: The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not e The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.
nvd
CVE-2022-42252HIGHCVSS 7.5≥ 8.5.0, < 8.5.83≥ 9.0.0, < 9.0.68+2 more2022-11-01
CVE-2022-42252 [HIGH] CWE-444 CVE-2022-42252: If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 wa If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was locat
nvd
Apache Tomcat vulnerabilities | cvebase