First published: Tue Feb 23 2016(Updated: )
The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=9.0.0.M0<9.0.0.M2 | 9.0.0.M2 |
maven/org.apache.tomcat:tomcat | >=8.0.0<8.0.31 | 8.0.31 |
maven/org.apache.tomcat:tomcat | <7.0.68 | 7.0.68 |
redhat/tomcat | <8.0.32 | 8.0.32 |
redhat/tomcat | <7.0.68 | 7.0.68 |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.2-beta | |
Apache Tomcat | =7.0.4-beta | |
Apache Tomcat | =7.0.5-beta | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.10 | |
Apache Tomcat | =7.0.11 | |
Apache Tomcat | =7.0.12 | |
Apache Tomcat | =7.0.14 | |
Apache Tomcat | =7.0.16 | |
Apache Tomcat | =7.0.19 | |
Apache Tomcat | =7.0.20 | |
Apache Tomcat | =7.0.21 | |
Apache Tomcat | =7.0.22 | |
Apache Tomcat | =7.0.23 | |
Apache Tomcat | =7.0.25 | |
Apache Tomcat | =7.0.26 | |
Apache Tomcat | =7.0.27 | |
Apache Tomcat | =7.0.28 | |
Apache Tomcat | =7.0.29 | |
Apache Tomcat | =7.0.30 | |
Apache Tomcat | =7.0.32 | |
Apache Tomcat | =7.0.33 | |
Apache Tomcat | =7.0.34 | |
Apache Tomcat | =7.0.35 | |
Apache Tomcat | =7.0.37 | |
Apache Tomcat | =7.0.39 | |
Apache Tomcat | =7.0.40 | |
Apache Tomcat | =7.0.41 | |
Apache Tomcat | =7.0.42 | |
Apache Tomcat | =7.0.47 | |
Apache Tomcat | =7.0.50 | |
Apache Tomcat | =7.0.52 | |
Apache Tomcat | =7.0.53 | |
Apache Tomcat | =7.0.54 | |
Apache Tomcat | =7.0.55 | |
Apache Tomcat | =7.0.56 | |
Apache Tomcat | =7.0.57 | |
Apache Tomcat | =7.0.59 | |
Apache Tomcat | =7.0.61 | |
Apache Tomcat | =7.0.62 | |
Apache Tomcat | =7.0.63 | |
Apache Tomcat | =7.0.64 | |
Apache Tomcat | =7.0.65 | |
Apache Tomcat | =7.0.67 | |
Apache Tomcat | =8.0.0-rc1 | |
Apache Tomcat | =8.0.0-rc10 | |
Apache Tomcat | =8.0.0-rc3 | |
Apache Tomcat | =8.0.0-rc5 | |
Apache Tomcat | =8.0.1 | |
Apache Tomcat | =8.0.3 | |
Apache Tomcat | =8.0.11 | |
Apache Tomcat | =8.0.12 | |
Apache Tomcat | =8.0.14 | |
Apache Tomcat | =8.0.15 | |
Apache Tomcat | =8.0.17 | |
Apache Tomcat | =8.0.18 | |
Apache Tomcat | =8.0.20 | |
Apache Tomcat | =8.0.21 | |
Apache Tomcat | =8.0.22 | |
Apache Tomcat | =8.0.23 | |
Apache Tomcat | =8.0.24 | |
Apache Tomcat | =8.0.26 | |
Apache Tomcat | =8.0.27 | |
Apache Tomcat | =8.0.28 | |
Apache Tomcat | =8.0.29 | |
Apache Tomcat | =8.0.30 | |
Apache Tomcat | =9.0.0-milestone1 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 | |
Apache Tomcat | =9.0.0-m1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5351 is classified as a medium severity vulnerability that poses a risk of remote attacks allowing CSRF token bypass.
To remediate CVE-2015-5351, upgrade Apache Tomcat to version 7.0.68, 8.0.31, or 9.0.0.M2 or later.
CVE-2015-5351 affects Apache Tomcat versions before 7.0.68, 8.0.31, and 9.0.0.M2.
No, CVE-2015-5351 specifically impacts installations of Apache Tomcat versions below the mentioned thresholds.
CVE-2015-5351 allows attackers to bypass CSRF protection mechanisms, potentially compromising the application's integrity.