The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. Reference: https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
Created tomcat tracking bugs for this issue: Affects: fedora-all [bug 2047419] Created tomcat:master/tomcat tracking bugs for this issue: Affects: fedora-all [bug 2047418]
Upstream commit: https://github.com/apache/tomcat/commit/70da1aaa51e0f9d088438e9d958812a144e12754
This issue has been addressed in the following products: Red Hat Fuse 7.11 Via RHSA-2022:5532 https://access.redhat.com/errata/RHSA-2022:5532
This issue has been addressed in the following products: JWS 5.7.0 Via RHSA-2022:7273 https://access.redhat.com/errata/RHSA-2022:7273
This issue has been addressed in the following products: Red Hat JBoss Web Server 5.7 on RHEL 9 Red Hat JBoss Web Server 5.7 on RHEL 7 Red Hat JBoss Web Server 5.7 on RHEL 8 Via RHSA-2022:7272 https://access.redhat.com/errata/RHSA-2022:7272
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-23181
This issue has been addressed in the following products: Spring Boot 2.7.2.SP1 Via RHSA-2023:0272 https://access.redhat.com/errata/RHSA-2023:0272