CVE-2017-5648
critical-risk
Published 2017-04-17
While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
Do I need to act?
!
21.8% chance of exploitation in next 30 days
EPSS score — higher than 78% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (42)
Third Party Advisory
http://www.securityfocus.com/bid/97530
and 22 more references
78
/ 100
critical-risk
Severity
31/34 · Critical
Exploitability
14/34 · Moderate
Exposure
33/34 · Critical