First published: Fri May 20 2011(Updated: )
Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | =7.0.12 | |
Apache Tomcat | =7.0.13 | |
maven/org.apache.tomcat:tomcat | >=7.0.12<7.0.14 | 7.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1582 is considered a medium severity vulnerability due to its potential for bypassing security constraints.
To fix CVE-2011-1582, upgrade Apache Tomcat to version 7.0.14 or later.
CVE-2011-1582 affects Apache Tomcat versions 7.0.12 and 7.0.13.
The impact of CVE-2011-1582 is that it allows remote attackers to bypass access restrictions on servlets.
Yes, CVE-2011-1582 involves a misconfiguration where the first request to a servlet is processed without adhering to security constraints.