Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2022-4132: Security patch for tomcat7 (ALAS-2023-1738)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Amazon Linux AMI: CVE-2022-4132: Security patch for tomcat7 (ALAS-2023-1738)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/27/2023
Created
05/05/2023
Added
05/04/2023
Modified
10/10/2023

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From ALAS-2023-1738:

2023-05-11: CVE-2017-12616 was added to this advisory.

When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request. ( CVE-2017-12616)

Tomcat: Memory leak (CVE-2022-4132)

Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. (CVE-2023-24998)

Solution(s)

  • amazon-linux-upgrade-tomcat7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;