First published: Fri May 13 2022(Updated: )
Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by improper error handling in WebSocket connection. By sending a specially-crafted WebSocket message concurrently with the WebSocket connection closing, an attacker could exploit this vulnerability to continue to use the socket after it has been closed.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | >=8.5.0<8.5.76 | |
Apache Tomcat | >=9.0.0<9.0.21 | |
Oracle Agile PLM | =9.3.6 | |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-25762 is high with a score of 8.6.
CVE-2022-25762 affects web applications running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20.
CVE-2022-25762 occurs when a web application sends a WebSocket message concurrently with the WebSocket connection closing.
The impact of CVE-2022-25762 is that the application may continue to use the socket after it has been closed, leading to potential security vulnerabilities.
To fix CVE-2022-25762, it is recommended to upgrade to Apache Tomcat version 8.5.76 or 9.0.21, depending on the affected version.