CVE-2011-2481
Published Aug 15, 2011
Last updated a year ago
Overview
- Description
- Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application. NOTE: this vulnerability exists because of a CVE-2009-0783 regression.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F8C62EF-1B67-456A-9C66-755439CF8556" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33E9607B-4D28-460D-896B-E4B7FA22441E" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A819E245-D641-4F19-9139-6C940504F6E7" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C381275-10C5-4939-BCE3-0D1F3B3CB2EE" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7205475A-6D04-4042-B24E-1DA5A57029B7" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08022987-B36B-4F63-88A5-A8F59195DF4A" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF4B7557-EF35-451E-B55D-3296966695AC" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8980E61E-27BE-4858-82B3-C0E8128AF521" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8756BF9B-3E24-4677-87AE-31CE776541F0" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88CE057E-2092-4C98-8D0C-75CF439D0A9C" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F194580-EE6D-4E38-87F3-F0661262256B" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9731BAA-4C6C-4259-B786-F577D8A90FA1" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F74A421-D019-4248-84B8-C70D4D9A8A95" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05346F5A-FB52-4376-AAC7-9A5308216545" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "305688F2-50A6-41FB-8614-BC589DB9A789" } ], "operator": "OR" } ] } ]