CVE-2021-25329
Summary
| CVE | CVE-2021-25329 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-03-01 12:15:00 UTC |
| Updated | 2023-11-07 03:31:00 UTC |
| Description | The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Tomcat | 10.0.0 | - | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone1 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone10 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone2 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone3 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone4 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone5 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone6 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone7 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone8 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone9 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone1 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone10 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone11 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone12 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone13 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone14 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone15 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone16 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone17 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone18 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone19 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone2 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone20 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone21 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone22 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone23 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone24 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone25 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone26 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone27 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone3 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone4 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone5 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone6 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone7 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone8 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone9 | All | All |
| Application | Apache | Tomcat | 10.0.0 | - | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone1 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone10 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone2 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone3 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone4 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone5 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone6 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone7 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone8 | All | All |
| Application | Apache | Tomcat | 10.0.0 | milestone9 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone1 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone10 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone11 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone12 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone13 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone14 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone15 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone16 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone17 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone18 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone19 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone2 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone20 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone21 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone22 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone23 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone24 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone25 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone26 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone27 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone3 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone4 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone5 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone6 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone7 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone8 | All | All |
| Application | Apache | Tomcat | 9.0.0 | milestone9 | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Application | Oracle | Agile Plm | 9.3.3 | All | All | All |
| Application | Oracle | Agile Plm | 9.3.6 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Policy | 1.14.0 | All | All | All |
| Application | Oracle | Communications Cloud Native Core Security Edge Protection Proxy | 1.6.0 | All | All | All |
| Application | Oracle | Communications Instant Messaging Server | 10.0.1.5.0 | All | All | All |
| Application | Oracle | Database | 12.2.0.1 | All | All | All |
| Application | Oracle | Database | 19c | All | All | All |
| Application | Oracle | Database | 21c | All | All | All |
| Application | Oracle | Graph Server And Client | All | All | All | All |
| Application | Oracle | Instantis Enterprisetrack | 17.1 | All | All | All |
| Application | Oracle | Instantis Enterprisetrack | 17.2 | All | All | All |
| Application | Oracle | Instantis Enterprisetrack | 17.3 | All | All | All |
| Application | Oracle | Managed File Transfer | 12.2.1.3.0 | All | All | All |
| Application | Oracle | Managed File Transfer | 12.2.1.4.0 | All | All | All |
| Application | Oracle | Mysql Enterprise Monitor | All | All | All | All |
| Application | Oracle | Siebel Ui Framework | All | All | All | All |
| Application | Oracle | Siebel Ui Framework | 21.9 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| [tomcat-users] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence) | lists.apache.org | ||
| [tomcat-users] 20210701 Re: What is "h2c"? What is CVE-2021-25329? Re: Most recent security-related update to 8.5 | lists.apache.org | ||
| [announce] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence) | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| Oracle Critical Patch Update Advisory - July 2021 | N/A | www.oracle.com | |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Patch, Vendor Advisory |
| Oracle Critical Patch Update Advisory - October 2021 | MISC | www.oracle.com | |
| Oracle Critical Patch Update Advisory - January 2022 | MISC | www.oracle.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| [tomcat-dev] 20210301 [SECURITY] CVE-2021-25329 Apache Tomcat Incomplete fix for CVE-2020-9484 (RCE via session persistence) | lists.apache.org | ||
| Debian -- Security Information -- DSA-4891-1 tomcat9 | DEBIAN | www.debian.org | |
| [tomcat-users] 20210701 What is "h2c"? What is CVE-2021-25329? Re: Most recent security-related update to 8.5 | lists.apache.org | ||
| [tomcat-users] 20210702 Re: What is "h2c"? What is CVE-2021-25329? Re: Most recent security-related update to 8.5 | lists.apache.org | ||
| March 2021 Apache Tomcat Vulnerabilities in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| [SECURITY] [DLA 2596-1] tomcat8 security update | MLIST | lists.debian.org | |
| oss-security - CVE-2021-25329: Apache Tomcat Incomplete fix for CVE-2020-9484 | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| Pony Mail! | MLIST | lists.apache.org | |
| Apache Tomcat: Multiple Vulnerabilities (GLSA 202208-34) — Gentoo security | GENTOO | security.gentoo.org | |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| [tomcat-dev] 20210301 svn commit: r1887027 - in /tomcat/site/trunk: docs/security-10.html docs/security-7.html docs/security-8.html docs/security-9.html xdocs/security-10.xml xdocs/security-7.xml xdocs/security-8.xml xdocs/security-9.xml | lists.apache.org | ||
| [tomcat-users] 20210702 Re: CVE-2021-25329, was Re: Most recent security-related update to 8.5 | lists.apache.org | ||
| Pony Mail! | CONFIRM | lists.apache.org | Mailing List, Vendor Advisory |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: This issue was identified by Trung Pham of Viettel Cyber Security.
Legacy QID Mappings
- 150471 Apache Tomcat Remote Code Execution Vulnerability (CVE-2021-25329)
- 174905 SUSE Enterprise Linux Security Update for tomcat (SUSE-SU-2021:0988-1)
- 174906 SUSE Enterprise Linux Security Update for tomcat (SUSE-SU-2021:0989-1)
- 174912 SUSE Enterprise Linux Security Update for tomcat (SUSE-SU-2021:1009-1)
- 174941 SUSE Enterprise Linux Security Update for tomcat (SUSE-SU-2021:1008-1)
- 174964 SUSE Enterprise Linux Security Update for tomcat (SUSE-SU-2021:1431-1)
- 178492 Debian Security Update for tomcat8 (DLA 2596-1)
- 178533 Debian Security Update for tomcat9 (DSA 4891-1)
- 180575 Debian Security Update for tomcat9 (CVE-2021-25329)
- 198724 Ubuntu Security Notification for Tomcat Vulnerabilities (USN-5360-1)
- 20270 Oracle Database 21c Critical Patch Update - October 2022
- 20271 Oracle Database 19c Critical Patch Update - October 2022
- 20272 Oracle Database 19c Critical OJVM Patch Update - October 2022
- 239760 Red Hat Update for red hat jboss web server 5.5.0 (RHSA-2021:2561)
- 352262 Amazon Linux Security Advisory for tomcat7: ALAS-2021-1493
- 352298 Amazon Linux Security Update for tomcat7: AL2012-2021-341
- 356300 Amazon Linux Security Advisory for tomcat : ALASTOMCAT8.5-2023-009
- 670219 EulerOS Security Update for tomcat (EulerOS-SA-2021-1856)
- 670309 EulerOS Security Update for tomcat (EulerOS-SA-2021-1915)
- 670333 EulerOS Security Update for tomcat (EulerOS-SA-2021-1891)
- 670677 EulerOS Security Update for tomcat (EulerOS-SA-2021-2435)
- 710609 Gentoo Linux Apache Tomcat Multiple Vulnerabilities (GLSA 202208-34)
- 730059 Atlassian Jira Server Multiple Security Vulnerabilities(JRASERVER-72211)
- 730228 McAfee Web Gateway Multiple Vulnerabilities (WP-3445, WP-3483, WP-3527, WP-3528, WP-3547, WP-3584,WP-3589,WP-3611)
- 730470 Atlassian Confluence Tomcat Vulnerability (CONFSERVER-62837)
- 730656 Apache Tomcat Request mix-up with h2c Vulnerability (CVE-2021-25122)
- 730662 Apache Tomcat Request mix-up with h2c Vulnerability (CVE-2021-25122)
- 730668 Apache Tomcat Request mix-up with h2c Vulnerability (CVE-2021-25122)
- 750285 OpenSUSE Security Update for tomcat (openSUSE-SU-2021:0496-1)
- 980338 Java (maven) Security Update for org.apache.tomcat.embed:tomcat-embed-core (GHSA-jgwr-3qm3-26f3)