First published: Mon Mar 01 2021(Updated: )
Last updated 2 August 2024
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jws5-ecj | <0:4.12.0-3.redhat_2.2.el7 | 0:4.12.0-3.redhat_2.2.el7 |
redhat/jws5-tomcat | <0:9.0.43-11.redhat_00011.1.el7 | 0:9.0.43-11.redhat_00011.1.el7 |
redhat/jws5-tomcat-native | <0:1.2.26-3.redhat_3.el7 | 0:1.2.26-3.redhat_3.el7 |
redhat/jws5-tomcat-vault | <0:1.1.8-2.Final_redhat_00003.1.el7 | 0:1.1.8-2.Final_redhat_00003.1.el7 |
redhat/jws5-ecj | <0:4.12.0-3.redhat_2.2.el8 | 0:4.12.0-3.redhat_2.2.el8 |
redhat/jws5-tomcat | <0:9.0.43-11.redhat_00011.1.el8 | 0:9.0.43-11.redhat_00011.1.el8 |
redhat/jws5-tomcat-native | <0:1.2.26-3.redhat_3.el8 | 0:1.2.26-3.redhat_3.el8 |
redhat/jws5-tomcat-vault | <0:1.1.8-2.Final_redhat_00003.1.el8 | 0:1.1.8-2.Final_redhat_00003.1.el8 |
redhat/tomcat | <10.0.2 | 10.0.2 |
redhat/tomcat | <9.0.43 | 9.0.43 |
redhat/tomcat | <8.5.63 | 8.5.63 |
redhat/tomcat | <7.0.108 | 7.0.108 |
Tomcat | >=7.0.0<=7.0.107 | |
Tomcat | >=8.5.0<=8.5.61 | |
Tomcat | >=9.0.0<=9.0.41 | |
Tomcat | =9.0.0-milestone1 | |
Tomcat | =9.0.0-milestone10 | |
Tomcat | =9.0.0-milestone11 | |
Tomcat | =9.0.0-milestone12 | |
Tomcat | =9.0.0-milestone13 | |
Tomcat | =9.0.0-milestone14 | |
Tomcat | =9.0.0-milestone15 | |
Tomcat | =9.0.0-milestone16 | |
Tomcat | =9.0.0-milestone17 | |
Tomcat | =9.0.0-milestone18 | |
Tomcat | =9.0.0-milestone19 | |
Tomcat | =9.0.0-milestone2 | |
Tomcat | =9.0.0-milestone20 | |
Tomcat | =9.0.0-milestone21 | |
Tomcat | =9.0.0-milestone22 | |
Tomcat | =9.0.0-milestone23 | |
Tomcat | =9.0.0-milestone24 | |
Tomcat | =9.0.0-milestone25 | |
Tomcat | =9.0.0-milestone26 | |
Tomcat | =9.0.0-milestone27 | |
Tomcat | =9.0.0-milestone3 | |
Tomcat | =9.0.0-milestone4 | |
Tomcat | =9.0.0-milestone5 | |
Tomcat | =9.0.0-milestone6 | |
Tomcat | =9.0.0-milestone7 | |
Tomcat | =9.0.0-milestone8 | |
Tomcat | =9.0.0-milestone9 | |
Tomcat | =10.0.0 | |
Tomcat | =10.0.0-milestone1 | |
Tomcat | =10.0.0-milestone10 | |
Tomcat | =10.0.0-milestone2 | |
Tomcat | =10.0.0-milestone3 | |
Tomcat | =10.0.0-milestone4 | |
Tomcat | =10.0.0-milestone5 | |
Tomcat | =10.0.0-milestone6 | |
Tomcat | =10.0.0-milestone7 | |
Tomcat | =10.0.0-milestone8 | |
Tomcat | =10.0.0-milestone9 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Oracle Agile Product Lifecycle Management Framework | =9.3.3 | |
Oracle Agile Product Lifecycle Management Framework | =9.3.6 | |
Oracle Communications Cloud Native Core Policy | =1.14.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =1.6.0 | |
Oracle Communications Instant Messaging Server | =10.0.1.5.0 | |
Oracle Database | =12.2.0.1 | |
Oracle Database | =19c | |
Oracle Database | =21c | |
Oracle Client | <21.3.0 | |
Oracle Instantis EnterpriseTrack | =17.1 | |
Oracle Instantis EnterpriseTrack | =17.2 | |
Oracle Instantis EnterpriseTrack | =17.3 | |
Oracle Managed File Transfer | =12.2.1.3.0 | |
Oracle Managed File Transfer | =12.2.1.4.0 | |
MySQL Enterprise Monitor | <=8.0.23 | |
Oracle Siebel User Interface Framework | <21.9 | |
Oracle Siebel User Interface Framework | =21.9 | |
debian/tomcat9 | 9.0.43-2~deb11u10 9.0.43-2~deb11u12 9.0.70-2 9.0.95-1 |
Users may configure the PersistenceManager with an appropriate value for sessionAttributeValueClassNameFilter to ensure that only application provided attributes are serialized and deserialized. For more details about the configuration, refer to the Apache Tomcat 9 Configuration Reference https://tomcat.apache.org/tomcat-9.0-doc/config/manager.html.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-25329 is a vulnerability in Apache Tomcat that allows remote attackers to execute arbitrary code or cause a denial of service.
CVE-2021-25329 has a high severity rating with a CVSS score of 7.0.
CVE-2021-25329 affects Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61, and 7.0.0 to 7.0.107.
To fix CVE-2021-25329, you should upgrade Apache Tomcat to version 10.0.2, 9.0.43, 8.5.63, or 7.0.108, depending on the affected version.
You can find more information about CVE-2021-25329 at the following references: [Reference 1](https://access.redhat.com/security/cve/CVE-2020-9484), [Reference 2](https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4), [Reference 3](https://github.com/apache/tomcat/commit/4785433a226a20df6acbea49296e1ce7e23de453).