QID 356303
Date Published: 2023-09-28
QID 356303: Amazon Linux Security Advisory for tomcat : ALASTOMCAT8.5-2023-005
A flaw was found in spring framework, specifically within two modules called spring mvc and spring webflux, (transitively affected from spring beans), using parameter data binding.
This flaw allows an attacker to pass specially-constructed malicious requests to certain parameters and possibly gain access to normally-restricted functionality within the java virtual machine. (
( CVE-2022-22965) the documentation of apache tomcat 10.1.0-m1 to 10.1.0-m14, 10.0.0-m1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the encryptinterceptor incorrectly stated it enabled tomcat clustering to run over an untrusted network.
This was not correct.
While the encryptinterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly dos risks. (
( CVE-2022-29885)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALASTOMCAT8.5-2023-005 -
alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2023-005.html
CVEs related to QID 356303
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALASTOMCAT8.5-2023-005 | amazon linux 2 |
|