CVE-2020-8022: Incorrect Default Permissions in Apache Tomcat
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42961%
CWE
Published
2/9/2022
Updated
7/10/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.tomcat:tomcat | maven | < 8.0.53 | 8.0.53 |
org.apache.tomcat:tomcat | maven | >= 9.0.0, < 9.0.35 | 9.0.35 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incorrect file permissions in packaging (specifically /usr/lib/tmpfiles.d/tomcat.conf
being group-writable), not from runtime code execution patterns. The provided patches show fixes to daemon.sh
that enforce proper umask settings (0027) and add configuration options, but these are mitigation measures rather than indicators of vulnerable functions. The exploit involves file system manipulation rather than specific function calls during runtime execution. No actual code functions handling requests or processing inputs were modified in the provided patches - the vulnerability exists at the packaging/configuration level rather than in executable code paths that would appear in a runtime profiler.