Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.tomcat/tomcat
  4. ›
  5. CVE-2009-3555

CVE-2009-3555: Improper Certificate Validation

May 2, 2022 (updated February 22, 2024)

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a “plaintext injection” attack, aka the “Project Mogul” issue.

References

  • github.com/advisories/GHSA-f7w7-6pjc-wwm6
  • nvd.nist.gov/vuln/detail/CVE-2009-3555
  • tomcat.apache.org/security-7.html

Code Behaviors & Features

Detect and mitigate CVE-2009-3555 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.0 before 5.5.33, all versions starting from 6.0.0 before 6.0.32, all versions starting from 7.0.0 before 7.0.10

Fixed versions

  • 6.0.32
  • 7.0.10
  • 5.5.33

Solution

Upgrade to versions 6.0.32, 7.0.10, 5.5.33 or above.

Impact 5.8 MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:P

Learn more about CVSS

Weakness

  • CWE-295: Improper Certificate Validation

Source file

maven/org.apache.tomcat/tomcat/CVE-2009-3555.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:45 +0000.