Improper Handling of Case Sensitivity vulnerability in Apache Tomcats GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
The product does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tomcat | Apache | 9.0.0 (including) | 9.0.105 (excluding) |
Tomcat | Apache | 10.1.0 (including) | 10.1.41 (excluding) |
Tomcat | Apache | 11.0.0 (including) | 11.0.7 (excluding) |
Tomcat10 | Ubuntu | esm-apps/noble | * |
Tomcat10 | Ubuntu | noble | * |
Tomcat10 | Ubuntu | oracular | * |
Tomcat10 | Ubuntu | plucky | * |
Tomcat10 | Ubuntu | upstream | * |
Tomcat11 | Ubuntu | devel | * |
Tomcat11 | Ubuntu | upstream | * |
Tomcat9 | Ubuntu | esm-apps/bionic | * |
Tomcat9 | Ubuntu | esm-apps/focal | * |
Tomcat9 | Ubuntu | esm-apps/jammy | * |
Tomcat9 | Ubuntu | focal | * |
Tomcat9 | Ubuntu | jammy | * |
Tomcat9 | Ubuntu | upstream | * |
Improperly handled case sensitive data can lead to several possible consequences, including: