QID 356178

Date Published: 2023-09-28

QID 356178: Amazon Linux Security Advisory for tomcat : ALASTOMCAT8.5-2023-010

While investigating bug 64830 it was discovered that apache tomcat 10.0.0-m1 to 10.0.0-m9, 9.0.0-m1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an http request header value from the previous stream received on an http/2 connection for the request associated with the subsequent stream.
While this would most likely lead to an error and the closure of the http/2 connection, it is possible that information could leak between requests. (
( CVE-2020-17527) when serving resources from a network location using the ntfs file system, apache tomcat versions 10.0.0-m1 to 10.0.0-m9, 9.0.0.m1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to jsp source code disclosure in some configurations.
The root cause was the unexpected behaviour of the jre api file.getcanonicalpath() which in turn was caused by the inconsistent behaviour of the windows api (findfirstfilew) in some circumstances. (
( CVE-2021-24122)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Please refer to Amazon advisory: ALASTOMCAT8.5-2023-010 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356178

    Software Advisories
    Advisory ID Software Component Link
    ALASTOMCAT8.5-2023-010 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2023-010.html