Search for vulnerabilities
| Vulnerability ID | VCID-j733-59p4-bbb5 |
| Aliases |
CVE-2009-3548
|
| Summary | |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 2.7 |
| Risk | 5.4 |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| System | Score | Found at |
|---|---|---|
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| epss | 0.88795 | https://api.first.org/data/v1/epss?cve=CVE-2009-3548 |
| apache_tomcat | Low | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548 |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2009-3548 | ||
| https://svn.apache.org/viewvc?view=rev&rev=881771 | ||
| https://svn.apache.org/viewvc?view=rev&rev=919006 | ||
| CVE-2009-3548 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548 | |
| CVE-2009-3548;OSVDB-60176 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/31433.rb |
| Data source | Metasploit |
|---|---|
| Description | This module can be used to execute a payload on Apache Tomcat servers that have an exposed "manager" application. The payload is uploaded as a WAR archive containing a jsp application using a POST request against the /manager/html/upload component. NOTE: The compatible payload sets vary based on the selected target. For example, you must select the Windows target to use native Windows payloads. |
| Note | Reliability: - unknown-reliability Stability: - unknown-stability SideEffects: - unknown-side-effects |
| Ransomware campaign use | Unknown |
| Source publication date | Nov. 9, 2009 |
| Platform | Java,Linux,Windows |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/tomcat_mgr_upload.rb |
| Data source | Exploit-DB |
|---|---|
| Date added | Feb. 5, 2014 |
| Description | Apache Tomcat Manager - Application Upload (Authenticated) Code Execution (Metasploit) |
| Ransomware campaign use | Known |
| Source publication date | Feb. 5, 2014 |
| Exploit type | remote |
| Platform | multiple |
| Source update date | Feb. 5, 2014 |
| Percentile | 0.99486 |
| EPSS Score | 0.88795 |
| Published At | Aug. 8, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T08:03:28.265892+00:00 | Apache Tomcat Importer | Import | https://tomcat.apache.org/security-6.html | 37.0.0 |