CVE-2009-0783

4.2 MEDIUM
Published: June 05, 2009 Modified: April 23, 2026
View on NVD

Description

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=127420533226623&w=2
Source: secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=129070310906557&w=2
Source: secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=136485229118404&w=2
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/35685
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35788
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/37460
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/42368
Source: secalert@redhat.com
Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1
Source: secalert@redhat.com
Third Party Advisory
http://support.apple.com/kb/HT4077
Source: secalert@redhat.com
Third Party Advisory
http://svn.apache.org/viewvc?rev=652592&view=rev
Source: secalert@redhat.com
Patch
http://svn.apache.org/viewvc?rev=681156&view=rev
Source: secalert@redhat.com
Patch
http://svn.apache.org/viewvc?rev=739522&view=rev
Source: secalert@redhat.com
Patch
http://svn.apache.org/viewvc?rev=781542&view=rev
Source: secalert@redhat.com
Patch
http://svn.apache.org/viewvc?rev=781708&view=rev
Source: secalert@redhat.com
Patch
http://tomcat.apache.org/security-4.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.debian.org/security/2011/dsa-2207
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/archive/1/504090/100/0/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35416
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022336
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1856
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3316
Source: secalert@redhat.com
Vendor Advisory
http://www.vupen.com/english/advisories/2010/3056
Source: secalert@redhat.com
Vendor Advisory
https://issues.apache.org/bugzilla/show_bug.cgi?id=29936
Source: secalert@redhat.com
Issue Tracking Patch
https://issues.apache.org/bugzilla/show_bug.cgi?id=45933
Source: secalert@redhat.com
Issue Tracking
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=127420533226623&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=129070310906557&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=136485229118404&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35685
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35788
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37460
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/42368
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT4077
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://svn.apache.org/viewvc?rev=652592&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://svn.apache.org/viewvc?rev=681156&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://svn.apache.org/viewvc?rev=739522&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://svn.apache.org/viewvc?rev=781542&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://svn.apache.org/viewvc?rev=781708&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://tomcat.apache.org/security-4.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2011/dsa-2207
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/504090/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35416
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022336
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1856
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/3056
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/51195
Source: af854a3a-2127-422b-91ae-364da2661108
VDB Entry
https://issues.apache.org/bugzilla/show_bug.cgi?id=29936
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch
https://issues.apache.org/bugzilla/show_bug.cgi?id=45933
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

94 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.2 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache