Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.tomcat/tomcat
  4. ›
  5. CVE-2011-1582

CVE-2011-1582: Access restriction bypass in Apache Tomcat

May 14, 2022 (updated February 14, 2023)

Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419.

References

  • mail-archives.apache.org/mod_mbox/www-announce/201105.mbox/%3C4DD26E30.2060103%40apache.org%3E
  • mail-archives.apache.org/mod_mbox/www-announce/201105.mbox/%3C4DD26E30.2060103@apache.org%3E
  • securityreason.com/securityalert/8256
  • svn.apache.org/viewvc?view=revision&revision=1100832
  • tomcat.apache.org/security-7.html
  • www.securityfocus.com/archive/1/518032/100/0/threaded
  • www.securityfocus.com/bid/47886
  • www.vupen.com/english/advisories/2011/1255
  • exchange.xforce.ibmcloud.com/vulnerabilities/67515
  • github.com/advisories/GHSA-3xpj-jgv5-q4vv
  • nvd.nist.gov/vuln/detail/CVE-2011-1582

Code Behaviors & Features

Detect and mitigate CVE-2011-1582 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.0.12 before 7.0.14

Fixed versions

  • 7.0.14

Solution

Upgrade to version 7.0.14 or above.

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N

Learn more about CVSS

Weakness

  • CWE-264

Source file

maven/org.apache.tomcat/tomcat/CVE-2011-1582.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:44 +0000.