First published: Mon Mar 14 2011(Updated: )
Apache Tomcat 7.x before 7.0.10 does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | =7.0.0 | |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.1 | |
Apache Tomcat | =7.0.2 | |
Apache Tomcat | =7.0.3 | |
Apache Tomcat | =7.0.4 | |
Apache Tomcat | =7.0.5 | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.7 | |
Apache Tomcat | =7.0.8 | |
Apache Tomcat | =7.0.9 | |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.10 | 7.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1088 is considered a medium severity vulnerability due to its potential to allow unauthorized access to web applications.
To fix CVE-2011-1088, upgrade Apache Tomcat to version 7.0.10 or later.
CVE-2011-1088 affects Apache Tomcat versions 7.0.0 through 7.0.9.
CVE-2011-1088 allows remote attackers to bypass intended access restrictions through flawed handling of ServletSecurity annotations.
Yes, CVE-2011-1088 specifically targets web applications hosted on affected versions of Apache Tomcat.