Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-42795: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Tomcat

0
Medium
VulnerabilityCVE-2023-42795cvecve-2023-42795cwe-459
Published: Tue Oct 10 2023 (10/10/2023, 17:42:16 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

AI-Powered Analysis

AILast updated: 10/29/2025, 12:22:45 UTC

Technical Analysis

CVE-2023-42795 is a medium-severity vulnerability classified under CWE-459 (Incomplete Cleanup) affecting multiple versions of Apache Tomcat, a widely used Java servlet container. The issue arises during the recycling of internal objects that Tomcat uses to handle HTTP requests and responses. Specifically, when Tomcat attempts to recycle these objects to improve performance and resource utilization, an error can cause the process to skip certain cleanup steps. This incomplete cleanup leads to residual data from one request or response being inadvertently retained and potentially exposed in subsequent requests handled by the same server instance. Such information leakage can include sensitive data such as authentication tokens, session identifiers, or other private information processed during the HTTP transaction. The vulnerability affects a broad range of Tomcat versions, including long-term support branches (8.5.x and 9.0.x) and newer milestone releases (10.1.x and 11.0.x). Exploitation does not require any privileges or user interaction, and the attack vector is network-based, meaning an attacker can potentially trigger the vulnerability remotely by sending crafted HTTP requests. Although no active exploits have been reported, the nature of the vulnerability makes it a concern for environments where sensitive data is processed. The Apache Software Foundation has addressed the issue in subsequent releases, and upgrading to the patched versions is the primary remediation. The vulnerability does not impact integrity or availability but compromises confidentiality by leaking data across request boundaries.

Potential Impact

For European organizations, the incomplete cleanup vulnerability in Apache Tomcat can lead to unauthorized disclosure of sensitive information processed by web applications, including personal data protected under GDPR. This leakage could expose session tokens, user credentials, or other confidential information to attackers, potentially facilitating further attacks such as session hijacking or unauthorized access. Organizations in sectors like finance, healthcare, government, and critical infrastructure that rely heavily on Tomcat for web services are particularly at risk. The breach of confidentiality could result in regulatory penalties, reputational damage, and loss of customer trust. Since the vulnerability does not affect system integrity or availability, the immediate operational impact may be limited, but the data exposure risk is significant. The ease of remote exploitation without authentication increases the threat level, especially in public-facing web applications. European entities with strict data protection requirements must prioritize patching to avoid compliance violations and data breaches.

Mitigation Recommendations

European organizations should immediately assess their Apache Tomcat deployments to identify affected versions. The primary mitigation is to upgrade to the fixed versions: 8.5.94 or later, 9.0.81 or later, 10.1.14 or later, or 11.0.0-M12 or later. If immediate upgrading is not feasible, organizations should implement strict network controls to limit access to Tomcat servers, such as IP whitelisting and web application firewalls (WAFs) configured to detect anomalous HTTP request patterns. Additionally, review and minimize sensitive data exposure in HTTP responses and ensure session management follows best practices to reduce the impact of potential leaks. Conduct thorough logging and monitoring to detect unusual request patterns that might indicate exploitation attempts. Regularly audit and sanitize application code to avoid storing sensitive data in server-side objects unnecessarily. Finally, maintain an up-to-date inventory of Tomcat instances and enforce patch management policies to prevent similar vulnerabilities from persisting.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2023-09-14T12:11:26.550Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690204523aaa02566521b4e2

Added to database: 10/29/2025, 12:10:58 PM

Last enriched: 10/29/2025, 12:22:45 PM

Last updated: 11/6/2025, 9:33:08 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats