First published: Tue Oct 10 2023(Updated: )
Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by an incomplete Cleanup vulnerability when recycling various internal objects. By skipping some parts of the recycling process, an attacker could exploit this vulnerability to obtain sensitive information leaking from the current request/response to the next.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | >=8.5.0<8.5.94 | |
Apache Tomcat | >=9.0.1<9.0.81 | |
Apache Tomcat | >=10.1.1<10.1.14 | |
Apache Tomcat | =9.0.0-milestone1 | |
Apache Tomcat | =9.0.0-milestone10 | |
Apache Tomcat | =9.0.0-milestone11 | |
Apache Tomcat | =9.0.0-milestone12 | |
Apache Tomcat | =9.0.0-milestone13 | |
Apache Tomcat | =9.0.0-milestone14 | |
Apache Tomcat | =9.0.0-milestone15 | |
Apache Tomcat | =9.0.0-milestone16 | |
Apache Tomcat | =9.0.0-milestone17 | |
Apache Tomcat | =9.0.0-milestone18 | |
Apache Tomcat | =9.0.0-milestone19 | |
Apache Tomcat | =9.0.0-milestone2 | |
Apache Tomcat | =9.0.0-milestone20 | |
Apache Tomcat | =9.0.0-milestone21 | |
Apache Tomcat | =9.0.0-milestone22 | |
Apache Tomcat | =9.0.0-milestone23 | |
Apache Tomcat | =9.0.0-milestone24 | |
Apache Tomcat | =9.0.0-milestone25 | |
Apache Tomcat | =9.0.0-milestone26 | |
Apache Tomcat | =9.0.0-milestone27 | |
Apache Tomcat | =9.0.0-milestone3 | |
Apache Tomcat | =9.0.0-milestone4 | |
Apache Tomcat | =9.0.0-milestone5 | |
Apache Tomcat | =9.0.0-milestone6 | |
Apache Tomcat | =9.0.0-milestone7 | |
Apache Tomcat | =9.0.0-milestone8 | |
Apache Tomcat | =9.0.0-milestone9 | |
Apache Tomcat | =10.1.0-milestone1 | |
Apache Tomcat | =10.1.0-milestone10 | |
Apache Tomcat | =10.1.0-milestone11 | |
Apache Tomcat | =10.1.0-milestone12 | |
Apache Tomcat | =10.1.0-milestone13 | |
Apache Tomcat | =10.1.0-milestone14 | |
Apache Tomcat | =10.1.0-milestone15 | |
Apache Tomcat | =10.1.0-milestone16 | |
Apache Tomcat | =10.1.0-milestone17 | |
Apache Tomcat | =10.1.0-milestone18 | |
Apache Tomcat | =10.1.0-milestone19 | |
Apache Tomcat | =10.1.0-milestone2 | |
Apache Tomcat | =10.1.0-milestone20 | |
Apache Tomcat | =10.1.0-milestone3 | |
Apache Tomcat | =10.1.0-milestone4 | |
Apache Tomcat | =10.1.0-milestone5 | |
Apache Tomcat | =10.1.0-milestone6 | |
Apache Tomcat | =10.1.0-milestone7 | |
Apache Tomcat | =10.1.0-milestone8 | |
Apache Tomcat | =10.1.0-milestone9 | |
Apache Tomcat | =11.0.0-milestone1 | |
Apache Tomcat | =11.0.0-milestone10 | |
Apache Tomcat | =11.0.0-milestone11 | |
Apache Tomcat | =11.0.0-milestone2 | |
Apache Tomcat | =11.0.0-milestone3 | |
Apache Tomcat | =11.0.0-milestone4 | |
Apache Tomcat | =11.0.0-milestone5 | |
Apache Tomcat | =11.0.0-milestone6 | |
Apache Tomcat | =11.0.0-milestone7 | |
Apache Tomcat | =11.0.0-milestone8 | |
Apache Tomcat | =11.0.0-milestone9 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
debian/tomcat10 | 10.1.6-1+deb12u1 10.1.16-1 | |
debian/tomcat9 | <=9.0.31-1~deb10u6<=9.0.43-2~deb11u6 | 9.0.31-1~deb10u10 9.0.43-2~deb11u9 9.0.70-2 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=8.5.0<8.5.94 | 8.5.94 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=9.0.0-M1<9.0.81 | 9.0.81 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=10.1.0-M1<10.1.14 | 10.1.14 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=11.0.0-M1<11.0.0-M12 | 11.0.0-M12 |
maven/org.apache.tomcat:tomcat | >=8.5.0<8.5.94 | 8.5.94 |
maven/org.apache.tomcat:tomcat | >=9.0.0-M1<9.0.81 | 9.0.81 |
maven/org.apache.tomcat:tomcat | >=10.1.0-M1<10.1.14 | 10.1.14 |
maven/org.apache.tomcat:tomcat | >=11.0.0-M1<11.0.0-M12 | 11.0.0-M12 |
redhat/tomcat | <11.0.0 | 11.0.0 |
redhat/tomcat | <10.1.14 | 10.1.14 |
redhat/tomcat | <9.0.81 | 9.0.81 |
redhat/tomcat | <8.5.94 | 8.5.94 |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42795 is an incomplete cleanup vulnerability in Apache Tomcat that could lead to sensitive data leakage to subsequent requests.
Apache Tomcat versions 11.0.0-M1 through 11.0.0-M11, 10.1.0-M1 through 10.1.13, 9.0.0-M1 through 9.0.80, and 8.5.0 through 8.5.93 are affected by CVE-2023-42795.
To fix CVE-2023-42795, you should update Apache Tomcat to version 8.5.94, 9.0.81, 10.1.14, or 11.0.0-M12.
The severity of CVE-2023-42795 is not provided.
You can find more information about CVE-2023-42795 in the following references: [1] [2] [3].