Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-8w1a-ww52-x7em
Vulnerability ID VCID-8w1a-ww52-x7em
Aliases CVE-2008-4308
GHSA-7g59-hm8v-cwmc
Summary The doRead method in Apache Tomcat 4.1.32 through 4.1.34 and 5.5.10 through 5.5.20 does not return a -1 to indicate when a certain error condition has occurred, which can cause Tomcat to send POST content from one request to a different request.
Status Published
Exploitability 0.5
Weighted Severity 2.7
Risk 1.4
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual LOW http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000010.html
generic_textual LOW http://jvn.jp/en/jp/JVN66905322/index.html
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
epss 0.07599 https://api.first.org/data/v1/epss?cve=CVE-2008-4308
apache_tomcat Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4308
cvssv3.1_qr LOW https://github.com/advisories/GHSA-7g59-hm8v-cwmc
generic_textual LOW https://github.com/apache/tomcat
generic_textual LOW https://issues.apache.org/bugzilla/show_bug.cgi?id=40771
generic_textual LOW https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
generic_textual LOW https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
cvssv2 2.6 https://nvd.nist.gov/vuln/detail/CVE-2008-4308
generic_textual LOW https://nvd.nist.gov/vuln/detail/CVE-2008-4308
generic_textual LOW https://web.archive.org/web/20090228052951/http://secunia.com/advisories/34057
generic_textual LOW https://web.archive.org/web/20111229174634/http://www.securityfocus.com/archive/1/501250
generic_textual LOW https://web.archive.org/web/20201207165808/http://www.securityfocus.com/bid/33913
Reference id Reference type URL
http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000010.html
http://jvn.jp/en/jp/JVN66905322/index.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4308.json
https://api.first.org/data/v1/epss?cve=CVE-2008-4308
http://secunia.com/advisories/34057
https://github.com/apache/tomcat
https://issues.apache.org/bugzilla/show_bug.cgi?id=40771
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
https://web.archive.org/web/20090228052951/http://secunia.com/advisories/34057
https://web.archive.org/web/20111229174634/http://www.securityfocus.com/archive/1/501250
https://web.archive.org/web/20201207165808/http://www.securityfocus.com/bid/33913
http://www.securityfocus.com/archive/1/501250
http://www.securityfocus.com/bid/33913
http://www.vupen.com/english/advisories/2009/0541
488040 https://bugzilla.redhat.com/show_bug.cgi?id=488040
cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:4.1.34:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
CVE-2008-4308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4308
CVE-2008-4308 https://nvd.nist.gov/vuln/detail/CVE-2008-4308
GHSA-7g59-hm8v-cwmc https://github.com/advisories/GHSA-7g59-hm8v-cwmc
No exploits are available.
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2008-4308
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.9181
EPSS Score 0.07599
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:38:19.238568+00:00 Apache Tomcat Importer Import https://tomcat.apache.org/security-5.html 38.0.0