Description
Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419.
Remediation
References
http://www.vupen.com/english/advisories/2011/1255
http://svn.apache.org/viewvc?view=revision&revision=1100832
http://www.securityfocus.com/bid/47886
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.14_%28released_12_May_2011%29
http://securityreason.com/securityalert/8256
https://exchange.xforce.ibmcloud.com/vulnerabilities/67515
http://www.securityfocus.com/archive/1/518032/100/0/threaded
http://mail-archives.apache.org/mod_mbox/www-announce/201105.mbox/%3C4DD26E30.2060103%40apache.org%3E
Related Vulnerabilities
CVE-2023-28679 Vulnerability in maven package javagh.jenkins:mashup-portlets-plugin
CVE-2012-5887 Vulnerability in maven package org.apache.tomcat:catalina
CVE-2021-21604 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-3143 Vulnerability in maven package org.wildfly.security:wildfly-elytron-password-impl
CVE-2012-0022 Vulnerability in maven package org.apache.tomcat:tomcat-catalina