First published: Thu Jan 27 2022(Updated: )
The fix for bug <a href="https://access.redhat.com/security/cve/CVE-2020-9484">CVE-2020-9484</a> introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. Reference: <a href="https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9">https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat | >=10.1.0-M1<=10.1.0-M8 | |
Tomcat | >=10.0.0-M5<=10.0.14 | |
Tomcat | >=9.0.35<=9.0.56 | |
Tomcat | >=8.5.55<=8.5.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2047417 is considered high due to its potential to allow local attackers to exploit a time of check, time of use vulnerability.
To fix REDHAT-BUG-2047417, upgrade to the latest version of Apache Tomcat that is not affected by the vulnerability.
Apache Tomcat versions 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56, and 8.5.55 to 8.5.73 are affected by REDHAT-BUG-2047417.
REDHAT-BUG-2047417 is identified as a time of check, time of use vulnerability within the Apache Tomcat software.
No, REDHAT-BUG-2047417 requires local access for exploitation, making it less likely to be exploited remotely.