CVE-2011-1582: Access restriction bypass in Apache Tomcat
(updated )
Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419.
References
- mail-archives.apache.org/mod_mbox/www-announce/201105.mbox/%3C4DD26E30.2060103%40apache.org%3E
- mail-archives.apache.org/mod_mbox/www-announce/201105.mbox/%3C4DD26E30.2060103@apache.org%3E
- securityreason.com/securityalert/8256
- svn.apache.org/viewvc?view=revision&revision=1100832
- tomcat.apache.org/security-7.html
- www.securityfocus.com/archive/1/518032/100/0/threaded
- www.securityfocus.com/bid/47886
- www.vupen.com/english/advisories/2011/1255
- exchange.xforce.ibmcloud.com/vulnerabilities/67515
- github.com/advisories/GHSA-3xpj-jgv5-q4vv
- nvd.nist.gov/vuln/detail/CVE-2011-1582
Detect and mitigate CVE-2011-1582 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →