Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-11784

Опубликовано: 04 окт. 2018
Источник: debian
EPSS Высокий

Описание

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat9not-affectedpackage
tomcat8fixed8.5.34-1package
tomcat8.0removedpackage
tomcat7fixed7.0.72-3package

Примечания

  • tomcat8.0 builds only tomcat8.0-user and libtomcat8.0-java

  • Since 7.0.72-3, src:tomcat7 only builds the Servlet API

  • Fixed upstream in 9.0.12, 8.5.34, 7.0.91

  • https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E

  • https://svn.apache.org/r1840055 (9.0.x)

  • https://svn.apache.org/r1840056 (8.5.x)

  • https://svn.apache.org/r1840057 (7.0.x)

EPSS

Процентиль: 99%
0.87814
Высокий

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 6 лет назад

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 5.3
redhat
больше 6 лет назад

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

CVSS3: 4.3
nvd
больше 6 лет назад

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

suse-cvrf
больше 6 лет назад

Security update for tomcat

suse-cvrf
больше 6 лет назад

Security update for tomcat

EPSS

Процентиль: 99%
0.87814
Высокий