Description
Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
Published: 2008-02-12
Score: 5.8 Medium
EPSS: 4.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-2675 Apache Tomcat 6.0.0 through 6.0.15 processes parameters in the context of the wrong request when an exception occurs during parameter processing, which might allow remote attackers to obtain sensitive information, as demonstrated by disconnecting during this processing in order to trigger the exception.
Github GHSA Github GHSA GHSA-5x5f-9r6q-q7mh Apache Tomcat Sensitive Information Disclosure
History

No history.

Subscriptions

Apache Tomcat
Redhat Jboss Enterprise Application Platform Rhel Application Stack
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T07:32:23.827Z

Reserved: 2007-12-03T00:00:00.000Z

Link: CVE-2008-0002

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-02-12T01:00:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-0002

cve-icon Redhat

Severity : Important

Publid Date: 2008-02-08T00:00:00Z

Links: CVE-2008-0002 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses