The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Apache Tomcat

computer vulnerability alert CVE-2018-11784

Apache Tomcat: open redirect via Directory Redirect

Synthesis of the vulnerability

An attacker can deceive the user via Directory Redirect of Apache Tomcat, in order to redirect him to a malicious site.
Impacted products: Tomcat, Debian, Fedora, ePO, McAfee Web Gateway, Snap Creator Framework, SnapManager, openSUSE Leap, Solaris, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: user access/rights, data reading.
Provenance: internet client.
Creation date: 04/10/2018.
Identifiers: bulletinoct2018, CVE-2018-11784, DLA-1544-1, DLA-1545-1, FEDORA-2018-b89746cb9b, NTAP-20181014-0002, openSUSE-SU-2018:3453-1, openSUSE-SU-2018:4042-1, openSUSE-SU-2019:0084-1, RHSA-2019:0130-01, RHSA-2019:0131-01, SB10257, SB10264, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, SUSE-SU-2018:3393-1, SUSE-SU-2018:3935-1, SUSE-SU-2018:3968-1, USN-3787-1, VIGILANCE-VUL-27396.

Description of the vulnerability

An attacker can deceive the user via Directory Redirect of Apache Tomcat, in order to redirect him to a malicious site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-8034

Apache Tomcat: Man-in-the-Middle via WebSocket Client

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle via WebSocket Client on Apache Tomcat, in order to read or write data in the session.
Impacted products: Tomcat, Blue Coat CAS, Debian, Fedora, QRadar SIEM, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Ubuntu.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: internet server.
Creation date: 23/07/2018.
Identifiers: CERTFR-2018-AVI-584, CVE-2018-8034, DLA-1453-1, DLA-1491-1, DSA-4281-1, FEDORA-2018-b1832101b8, ibm10742719, openSUSE-SU-2018:2740-1, openSUSE-SU-2018:3054-1, RHSA-2019:0130-01, RHSA-2019:0131-01, SUSE-SU-2018:2699-1, SUSE-SU-2018:3011-2, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, SYMSA1463, USN-3723-1, VIGILANCE-VUL-26817.

Description of the vulnerability

An attacker can act as a Man-in-the-Middle via WebSocket Client on Apache Tomcat, in order to read or write data in the session.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-8037

Apache Tomcat: information disclosure via User Sessions Reuse

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via User Sessions Reuse of Apache Tomcat, in order to obtain sensitive information.
Impacted products: Tomcat, Debian, Fedora, QRadar SIEM, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 23/07/2018.
Identifiers: CERTFR-2018-AVI-356, CERTFR-2018-AVI-584, CVE-2018-8037, DSA-4281-1, FEDORA-2018-b1832101b8, ibm10742719, openSUSE-SU-2018:2740-1, openSUSE-SU-2018:3054-1, RHSA-2018:2867-01, RHSA-2018:2868-01, SUSE-SU-2018:2699-1, SUSE-SU-2018:3011-2, SUSE-SU-2018:3388-1, VIGILANCE-VUL-26816.

Description of the vulnerability

An attacker can bypass access restrictions to data via User Sessions Reuse of Apache Tomcat, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-1336

Apache Tomcat: infinite loop via UTF-8 Decoder

Synthesis of the vulnerability

An attacker can generate an infinite loop via UTF-8 Decoder of Apache Tomcat, in order to trigger a denial of service.
Impacted products: Tomcat, Blue Coat CAS, Debian, openSUSE Leap, RHEL, JBoss EAP by Red Hat, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Ubuntu.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: document.
Creation date: 23/07/2018.
Identifiers: CERTFR-2018-AVI-356, CVE-2018-1336, DLA-1491-1, DSA-4281-1, openSUSE-SU-2018:2740-1, openSUSE-SU-2018:3054-1, RHSA-2018:2700-01, RHSA-2018:2701-01, RHSA-2018:2740-01, RHSA-2018:2741-01, RHSA-2018:2742-01, RHSA-2018:2743-01, RHSA-2018:2921-01, RHSA-2018:2930-01, SUSE-SU-2018:2699-1, SUSE-SU-2018:3011-2, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, SYMSA1463, USN-3723-1, VIGILANCE-VUL-26815.

Description of the vulnerability

An attacker can generate an infinite loop via UTF-8 Decoder of Apache Tomcat, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-8014

Apache Tomcat: privilege escalation via CORS Filter SupportsCredentials All Origins

Synthesis of the vulnerability

An attacker can bypass restrictions via CORS Filter SupportsCredentials All Origins of Apache Tomcat, in order to escalate his privileges.
Impacted products: Tomcat, Debian, Fedora, openSUSE Leap, Solaris, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, data reading.
Provenance: intranet client.
Creation date: 17/05/2018.
Identifiers: bulletinjul2018, CVE-2018-8014, DLA-1400-1, DLA-1400-2, FEDORA-2018-b1832101b8, openSUSE-SU-2018:2740-1, openSUSE-SU-2018:3054-1, RHSA-2018:2469-01, RHSA-2018:2470-01, SUSE-SU-2018:2699-1, SUSE-SU-2018:3011-2, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, USN-3665-1, VIGILANCE-VUL-26154.

Description of the vulnerability

An attacker can bypass restrictions via CORS Filter SupportsCredentials All Origins of Apache Tomcat, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin 25883

Tomcat: Cross Site Scripting via Manager Application IE

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via Manager Application IE of Tomcat, in order to run JavaScript code in the context of the web site.
Impacted products: Tomcat.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 17/04/2018.
Identifiers: VIGILANCE-VUL-25883.

Description of the vulnerability

The Tomcat product offers a web service.

However, it does not filter received data via Manager Application IE before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via Manager Application IE of Tomcat, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2017-15706

Apache Tomcat: code execution via Documented CGI Search Algorithm

Synthesis of the vulnerability

An attacker can use a vulnerability via Documented CGI Search Algorithm of Apache Tomcat, in order to run code.
Impacted products: Tomcat, openSUSE Leap, Solaris, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 30/03/2018.
Identifiers: bulletinapr2018, CVE-2017-15706, openSUSE-SU-2018:0852-1, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, USN-3665-1, VIGILANCE-VUL-25725.

Description of the vulnerability

An attacker can use a vulnerability via Documented CGI Search Algorithm of Apache Tomcat, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-1323

Apache Tomcat JK ISAPI Connector: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of Apache Tomcat JK ISAPI Connector, in order to read a file outside the service root path.
Impacted products: Tomcat, Solaris.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 12/03/2018.
Identifiers: bulletinjan2019, CVE-2018-1323, VIGILANCE-VUL-25528.

Description of the vulnerability

An attacker can traverse directories of Apache Tomcat JK ISAPI Connector, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-1304 CVE-2018-1305

Apache Tomcat: privilege escalation

Synthesis of the vulnerability

An attacker can bypass restrictions of Apache Tomcat, in order to escalate his privileges.
Impacted products: Tomcat, Debian, Fedora, QRadar SIEM, openSUSE Leap, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, JBoss EAP by Red Hat, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 23/02/2018.
Identifiers: bulletinapr2018, cpuoct2018, CVE-2018-1304, CVE-2018-1305, DLA-1301-1, DLA-1400-1, DLA-1400-2, DLA-1450-1, DSA-4281-1, FEDORA-2018-50f0da5d38, FEDORA-2018-a233dae4ab, ibm10719117, openSUSE-SU-2018:0852-1, RHSA-2018:0465-01, RHSA-2018:0466-01, RHSA-2018:1447-01, RHSA-2018:1448-01, RHSA-2018:1449-01, RHSA-2018:1450-01, RHSA-2018:1451-01, SUSE-SU-2018:1847-1, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, USN-3665-1, VIGILANCE-VUL-25358.

Description of the vulnerability

An attacker can bypass restrictions of Apache Tomcat, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2017-12617

Apache Tomcat: code execution via Read-write Default/WebDAV Servlet

Synthesis of the vulnerability

An attacker can use a vulnerability via Read-write Default/WebDAV Servlet of Apache Tomcat, in order to run code.
Impacted products: Tomcat, Debian, NetWorker, Fedora, MariaDB ~ precise, ePO, MySQL Community, MySQL Enterprise, openSUSE Leap, Oracle DB, Oracle Directory Server, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle Identity Management, Oracle Internet Directory, Oracle iPlanet Web Server, Tuxedo, WebLogic, Oracle Web Tier, Percona Server, XtraDB Cluster, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 20/09/2017.
Identifiers: 504539, 61542, CERTFR-2017-AVI-332, cpuapr2018, cpujan2018, cpujul2018, CVE-2017-12617, DLA-1166-1, DLA-1166-2, ESA-2017-097, FEDORA-2017-ef7c118dbc, FEDORA-2017-f499ee7b12, openSUSE-SU-2017:3069-1, RHSA-2017:3080-01, RHSA-2017:3081-01, RHSA-2017:3113-01, RHSA-2017:3114-01, RHSA-2018:0465-01, RHSA-2018:0466-01, SB10218, SUSE-SU-2017:3039-1, SUSE-SU-2017:3059-1, SUSE-SU-2017:3279-1, USN-3665-1, VIGILANCE-VUL-23883.

Description of the vulnerability

An attacker can use a vulnerability via Read-write Default/WebDAV Servlet of Apache Tomcat, in order to run code.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Apache Tomcat: