The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3160-1 tomcat9 security update
Debian DSA Debian DSA DSA-5265-1 tomcat9 security update
EUVD EUVD EUVD-2022-0937 The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
Github GHSA Github GHSA GHSA-9f3j-pm6f-9fm5 Race condition in Apache Tomcat
Ubuntu USN Ubuntu USN USN-6943-1 Tomcat vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T03:36:20.071Z

Reserved: 2022-01-12T00:00:00

Link: CVE-2022-23181

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-27T13:15:08.060

Modified: 2024-11-21T06:48:08.640

Link: CVE-2022-23181

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-01-26T00:00:00Z

Links: CVE-2022-23181 - Bugzilla

cve-icon OpenCVE Enrichment

No data.