Description
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
Published: 2022-05-13
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4051 If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.
Github GHSA Github GHSA GHSA-h3ch-5pp2-vh6w Improper socket reuse in Apache Tomcat
History

No history.

Subscriptions

Apache Tomcat
Oracle Agile Plm
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T04:49:43.478Z

Reserved: 2022-02-22T00:00:00.000Z

Link: CVE-2022-25762

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-13T08:15:06.843

Modified: 2024-11-21T06:52:57.447

Link: CVE-2022-25762

cve-icon Redhat

Severity : Important

Publid Date: 2022-05-12T00:00:00Z

Links: CVE-2022-25762 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses