Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-0232

Опубликовано: 15 апр. 2019
Источник: ubuntu
Приоритет: low
EPSS Критический
CVSS2: 9.3
CVSS3: 8.1

Описание

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).

РелизСтатусПримечание
bionic

not-affected

Windows only
cosmic

not-affected

Windows only
devel

DNE

esm-apps/bionic

not-affected

Windows only
esm-apps/xenial

not-affected

Windows only
esm-infra-legacy/trusty

not-affected

Windows only
precise/esm

DNE

trusty

not-affected

Windows only
trusty/esm

not-affected

Windows only
upstream

not-affected

debian: Windows-specific

Показывать по

РелизСтатусПримечание
bionic

not-affected

Windows only
cosmic

not-affected

Windows only
devel

DNE

esm-apps/bionic

not-affected

Windows only
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

Windows only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

debian: Windows-specific

Показывать по

РелизСтатусПримечание
bionic

not-affected

Windows only
cosmic

not-affected

Windows only
devel

not-affected

Windows only
esm-apps/bionic

not-affected

Windows only
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

debian: Windows-specific
xenial

DNE

Показывать по

EPSS

Процентиль: 100%
0.94225
Критический

9.3 Critical

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
около 6 лет назад

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).

CVSS3: 8.1
nvd
около 6 лет назад

When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).

CVSS3: 8.1
debian
около 6 лет назад

When running on Windows with enableCmdLineArguments enabled, the CGI S ...

CVSS3: 8.1
github
около 6 лет назад

Apache Tomcat OS Command Injection vulnerability

CVSS3: 8.1
fstec
около 6 лет назад

Уязвимость сервера приложений Apache Tomcat, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94225
Критический

9.3 Critical

CVSS2

8.1 High

CVSS3