Search for vulnerabilities
Vulnerability details: VCID-e318-2aad-aaag
Vulnerability ID VCID-e318-2aad-aaag
Aliases CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
Summary URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41080.json
epss 0.00383 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00383 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00383 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00383 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.00733 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.11116 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.11116 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.11116 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.11116 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.11116 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.11116 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.11116 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.1373 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.1373 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.1373 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.1373 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.1373 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14377 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.14678 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.706 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
epss 0.873 https://api.first.org/data/v1/epss?cve=CVE-2023-41080
apache_tomcat Moderate https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41080
apache_tomcat Moderate https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41080
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-q3mw-pvr8-9ggc
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-q3mw-pvr8-9ggc
cvssv3.1 7.5 https://github.com/apache/tomcat
generic_textual HIGH https://github.com/apache/tomcat
cvssv3.1 6.1 https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
generic_textual MODERATE https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
cvssv3.1 6.1 https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
generic_textual MODERATE https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
cvssv3.1 6.1 https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
generic_textual MODERATE https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
cvssv3.1 6.1 https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
generic_textual MODERATE https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
cvssv3.1 6.1 https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
generic_textual MODERATE https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
cvssv3.1 5.3 https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2023-41080
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2023-41080
cvssv3.1 6.1 https://security.netapp.com/advisory/ntap-20230921-0006
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20230921-0006
cvssv3.1 5.3 https://www.debian.org/security/2023/dsa-5521
generic_textual MODERATE https://www.debian.org/security/2023/dsa-5521
cvssv3.1 5.3 https://www.debian.org/security/2023/dsa-5522
generic_textual MODERATE https://www.debian.org/security/2023/dsa-5522
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41080.json
https://api.first.org/data/v1/epss?cve=CVE-2023-41080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41080
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://security.netapp.com/advisory/ntap-20230921-0006
https://security.netapp.com/advisory/ntap-20230921-0006/
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
2235370 https://bugzilla.redhat.com/show_bug.cgi?id=2235370
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CVE-2023-41080 https://nvd.nist.gov/vuln/detail/CVE-2023-41080
GHSA-q3mw-pvr8-9ggc https://github.com/advisories/GHSA-q3mw-pvr8-9ggc
RHSA-2023:5946 https://access.redhat.com/errata/RHSA-2023:5946
RHSA-2023:7622 https://access.redhat.com/errata/RHSA-2023:7622
RHSA-2023:7623 https://access.redhat.com/errata/RHSA-2023:7623
RHSA-2023:7678 https://access.redhat.com/errata/RHSA-2023:7678
RHSA-2024:0125 https://access.redhat.com/errata/RHSA-2024:0125
RHSA-2024:0474 https://access.redhat.com/errata/RHSA-2024:0474
RHSA-2024:1324 https://access.redhat.com/errata/RHSA-2024:1324
RHSA-2024:1325 https://access.redhat.com/errata/RHSA-2024:1325
RHSA-2024:4631 https://access.redhat.com/errata/RHSA-2024:4631
USN-7106-1 https://usn.ubuntu.com/7106-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41080.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/apache/tomcat
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-41080
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-41080
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://security.netapp.com/advisory/ntap-20230921-0006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.debian.org/security/2023/dsa-5521
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.debian.org/security/2023/dsa-5522
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.72745
EPSS Score 0.00383
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.