Vulnerability Description
The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat | >= 9.0.40, < 9.0.69 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzjMailing ListVendor Advisory
- https://security.gentoo.org/glsa/202305-37Third Party Advisory
- https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzjMailing ListVendor Advisory
- https://security.gentoo.org/glsa/202305-37Third Party Advisory
- https://security.netapp.com/advisory/ntap-20230216-0009/
FAQ
What is CVE-2022-45143?
CVE-2022-45143 is a vulnerability with a CVSS score of 7.5 (HIGH). The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user...
How severe is CVE-2022-45143?
CVE-2022-45143 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-45143?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat.