{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-29885","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","dateUpdated":"2024-08-03T06:33:42.950Z","dateReserved":"2022-04-28T00:00:00.000Z","datePublished":"2022-05-12T00:00:00.000Z"},"containers":{"cna":{"title":"EncryptInterceptor does not provide complete protection on insecure networks","providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2023-04-06T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks."}],"affected":[{"vendor":"Apache Software Foundation","product":"Apache Tomcat","versions":[{"version":"Apache Tomcat 10.1 10.1.0-M1 to 10.1.0-M14","status":"affected"},{"version":"Apache Tomcat 10 10.0.0-M1 to 10.0.20","status":"affected"},{"version":"Apache Tomcat 9 9.0.13 to 9.0.62","status":"affected"},{"version":"Apache Tomcat 8.5 8.5.38 to 8.5.78","status":"affected"}]}],"references":[{"url":"https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv"},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"url":"https://security.netapp.com/advisory/ntap-20220629-0002/"},{"name":"[debian-lts-announce] 20221026 [SECURITY] [DLA 3160-1] tomcat9 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html"},{"name":"DSA-5265","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5265"},{"url":"http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html"}],"credits":[{"lang":"en","value":"This issue was reported to the Apache Tomcat Security team by 4ra1n."}],"metrics":[{"other":{"type":"unknown","content":{"other":"low"}}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T06:33:42.950Z"},"title":"CVE Program Container","references":[{"url":"https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv","tags":["x_transferred"]},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20220629-0002/","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20221026 [SECURITY] [DLA 3160-1] tomcat9 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html"},{"name":"DSA-5265","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5265"},{"url":"http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html","tags":["x_transferred"]}]}]}}