CVE-2020-13935

Scores

EPSS

0.917high91.7%
0%20%40%60%80%100%

Percentile: 91.7%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Description

The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-400CWE-835

Related Vulnerabilities

Exploits

Exploit ID: CVE-2020-13935

Source: github-poc

URL: https://github.com/aabbcc19191/CVE-2020-13935

Vulnerable Software (182)

Type: Configuration

Product: jboss-as-appclient

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-appclient

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-cli

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-cli

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-client-all

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-client-all

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-clustering

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-clustering

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-cmp

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-cmp

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-configadmin

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-configadmin

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-connector

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-connector

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-controller

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-controller

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-controller-client

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-controller-client

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat

Type: Configuration

Product: jboss-as-core-security

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el6"}

Source: redhat

Type: Configuration

Product: jboss-as-core-security

Operating System: rhel

Trait:
{  "fixed": "7.5.24-2.Final_redhat_00001.1.ep6.el7"}

Source: redhat