Description
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2207-1 | tomcat5.5 security update |
EUVD |
EUVD-2022-4157 | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat |
Github GHSA |
GHSA-hhjg-g8xq-hhr3 | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat |
Ubuntu USN |
USN-788-1 | Tomcat vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T04:48:52.307Z
Reserved: 2009-03-04T00:00:00.000Z
Link: CVE-2009-0783
No data.
Status : Modified
Published: 2009-06-05T16:00:00.267
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-0783
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA
Ubuntu USN