Name | CVE-2015-5351 |
Description | The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-435-1, DSA-3530-1, DSA-3552-1, DSA-3609-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tomcat9 (PTS) | bullseye (security), bullseye | 9.0.43-2~deb11u10 | fixed |
| bookworm | 9.0.70-2 | fixed |
| sid, trixie | 9.0.95-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
- tomcat9 <not-affected> (Fixed before initial upload to Debian)
Since 6.0.41-3, src:tomcat6 only builds a servlet and docs
Fixed in 7.0.68, 8.0.32, 9.0.0.M3
Upstream advisory does not make reference to 6.x but looking at the
upstream patches reveals that this issue is fixed since 6.0.45
http://svn.apache.org/viewvc?view=revision&revision=1720661
http://svn.apache.org/viewvc?view=revision&revision=1720663