The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-435-1 tomcat6 security update
Debian DSA Debian DSA DSA-3530-1 tomcat6 security update
Debian DSA Debian DSA DSA-3552-1 tomcat7 security update
Debian DSA Debian DSA DSA-3609-1 tomcat8 security update
EUVD EUVD EUVD-2022-5521 The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
Github GHSA Github GHSA GHSA-w7cg-5969-678w Apache Tomcat allows remote attackers to bypass a CSRF protection mechanism by using a token
Ubuntu USN Ubuntu USN USN-3024-1 Tomcat vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html cve-icon cve-icon
http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-1089.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2599.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2807.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-2808.html cve-icon cve-icon
http://seclists.org/bugtraq/2016/Feb/148 cve-icon cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1720652 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1720655 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1720658 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1720660 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1720661 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1720663 cve-icon cve-icon
http://tomcat.apache.org/security-7.html cve-icon cve-icon
http://tomcat.apache.org/security-8.html cve-icon cve-icon
http://tomcat.apache.org/security-9.html cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3530 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3552 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3609 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html cve-icon cve-icon
http://www.securityfocus.com/bid/83330 cve-icon cve-icon
http://www.securitytracker.com/id/1035069 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-3024-1 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2016:1087 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2016:1088 cve-icon cve-icon
https://bto.bluecoat.com/security-advisory/sa118 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626 cve-icon cve-icon
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-5351 cve-icon
https://security.gentoo.org/glsa/201705-09 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20180531-0001/ cve-icon cve-icon
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM02978021 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-5351 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T06:41:09.347Z

Reserved: 2015-07-01T00:00:00

Link: CVE-2015-5351

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-02-25T01:59:03.263

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-5351

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-02-22T00:00:00Z

Links: CVE-2015-5351 - Bugzilla

cve-icon OpenCVE Enrichment

No data.