{"id":"CVE-2022-23181","details":"The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.","aliases":["BIT-tomcat-2022-23181","GHSA-9f3j-pm6f-9fm5"],"modified":"2026-04-16T04:39:22.679163988Z","published":"2022-01-27T13:15:08.060Z","related":["SUSE-SU-2022:0694-1","SUSE-SU-2022:0695-1","SUSE-SU-2022:0784-1","SUSE-SU-2022:0818-1","SUSE-SU-2026:1058-1","openSUSE-SU-2022:0818-1","openSUSE-SU-2024:11864-1","openSUSE-SU-2024:13441-1"],"references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220217-0010/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5265"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tomcat","events":[{"introduced":"c8a57e4a2db8e5af314bae48123fb5990da5b7a5"},{"last_affected":"e8de8521b0f88b452ac6bd79abad3aad3bcc18b6"},{"introduced":"fc2c65d390444d75412855ad0de8b878018d02dc"},{"last_affected":"af2a7a4fb2db07390362af12d0020d550abd8785"},{"introduced":"e4344b6bd67359e1690312674d83710a793f1d5b"},{"last_affected":"3bb5b5fcf02e25ae627e480937e755e0a99c82d7"},{"introduced":"0"},{"last_affected":"9826be4c8368c94eab1e804b456867ca1cb766c3"},{"introduced":"0"},{"last_affected":"b3a208c6d6d01c553178c5e718e750b0eb318151"},{"introduced":"0"},{"last_affected":"27f7ef8cd0c637b700d564ec20f6ff92901f6b5c"},{"introduced":"0"},{"last_affected":"c549413165721180b15f62033c1be6c5970028fd"},{"introduced":"0"},{"last_affected":"b3f5e0d88336d81a61a767fc10ab06930c9587ee"},{"introduced":"0"},{"last_affected":"6f143d19d151620cd0bfe9ec2ffa429e36ad0e45"},{"introduced":"0"},{"last_affected":"f2ab9ac8bc3f40ee9b2cb50b030c99df927f0429"},{"introduced":"0"},{"last_affected":"0e59fedb28df646930c5aff945159b64d7a52260"},{"introduced":"0"},{"last_affected":"8778a44d6323c1066237043a89ab2f36696916b1"},{"introduced":"0"},{"last_affected":"e706972942e2c342e4a37baf5e2596f11e8a0e94"},{"introduced":"0"},{"last_affected":"2a10c8d9110d7b1c7f526f3352648c6b19ba2c52"},{"introduced":"0"},{"last_affected":"51d1031c36c0f2b3ee1e0d14b56228a559144153"},{"introduced":"0"},{"last_affected":"0f3f1e439a040068b741d77777766722e4420ad6"},{"introduced":"0"},{"last_affected":"cd53876fefaa370c31466b0f615e9ad026541a27"},{"introduced":"0"},{"last_affected":"4c8b650437e2464c1c31c6598a263b3805b7a81f"},{"introduced":"0"},{"last_affected":"56e547d387ab49f688c93fe9ca082b1b5d94deed"}],"database_specific":{"versions":[{"introduced":"8.5.55"},{"last_affected":"8.5.73"},{"introduced":"9.0.35"},{"last_affected":"9.0.56"},{"introduced":"10.0.1"},{"last_affected":"10.0.14"},{"introduced":"0"},{"last_affected":"10.0.0-milestone10"},{"introduced":"0"},{"last_affected":"10.0.0-milestone5"},{"introduced":"0"},{"last_affected":"10.0.0-milestone6"},{"introduced":"0"},{"last_affected":"10.0.0-milestone7"},{"introduced":"0"},{"last_affected":"10.0.0-milestone8"},{"introduced":"0"},{"last_affected":"10.0.0-milestone9"},{"introduced":"0"},{"last_affected":"10.1.0-milestone1"},{"introduced":"0"},{"last_affected":"10.1.0-milestone2"},{"introduced":"0"},{"last_affected":"10.1.0-milestone3"},{"introduced":"0"},{"last_affected":"10.1.0-milestone4"},{"introduced":"0"},{"last_affected":"10.1.0-milestone5"},{"introduced":"0"},{"last_affected":"10.1.0-milestone6"},{"introduced":"0"},{"last_affected":"10.1.0-milestone7"},{"introduced":"0"},{"last_affected":"10.1.0-milestone8"},{"introduced":"0"},{"last_affected":"10.0"},{"introduced":"0"},{"last_affected":"11.0"}]}}],"versions":["10.0.0","10.0.0-M10","10.0.0-M5","10.0.0-M6","10.0.0-M7","10.0.0-M8","10.0.0-M9","10.0.14","10.1.0-M1","10.1.0-M2","10.1.0-M3","10.1.0-M4","10.1.0-M5","10.1.0-M6","10.1.0-M7","10.1.0-M8","11.0.0","8.5.73","9.0.56"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.2.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.8.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.8.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.29"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23181.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}