CVE-2011-2526: Improper Input Validation
(updated )
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
References
- marc.info/?l=bugtraq&m=132215163318824&w=2
- marc.info/?l=bugtraq&m=133469267822771&w=2
- marc.info/?l=bugtraq&m=136485229118404&w=2
- marc.info/?l=bugtraq&m=139344343412337&w=2
- rhn.redhat.com/errata/RHSA-2012-0074.html
- rhn.redhat.com/errata/RHSA-2012-0075.html
- rhn.redhat.com/errata/RHSA-2012-0076.html
- svn.apache.org/viewvc?view=revision&revision=1145383
- svn.apache.org/viewvc?view=revision&revision=1145571
- svn.apache.org/viewvc?view=revision&revision=1145694
- svn.apache.org/viewvc?view=revision&revision=1146005
- tomcat.apache.org/security-5.html
- tomcat.apache.org/security-6.html
- tomcat.apache.org/security-7.html
- www.debian.org/security/2012/dsa-2401
- bugzilla.redhat.com/show_bug.cgi?id=720948
- exchange.xforce.ibmcloud.com/vulnerabilities/68541
- github.com/advisories/GHSA-9ggm-7897-x4mg
- lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2011-2526
Detect and mitigate CVE-2011-2526 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →