The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Tomcat

vulnerability bulletin 25883

Tomcat: Cross Site Scripting via Manager Application IE

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via Manager Application IE of Tomcat, in order to run JavaScript code in the context of the web site.
Impacted products: Tomcat.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 17/04/2018.
Identifiers: VIGILANCE-VUL-25883.

Description of the vulnerability

The Tomcat product offers a web service.

However, it does not filter received data via Manager Application IE before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via Manager Application IE of Tomcat, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2017-15706

Apache Tomcat: code execution via Documented CGI Search Algorithm

Synthesis of the vulnerability

An attacker can use a vulnerability via Documented CGI Search Algorithm of Apache Tomcat, in order to run code.
Impacted products: Tomcat, openSUSE Leap, Solaris, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 30/03/2018.
Identifiers: bulletinapr2018, CVE-2017-15706, openSUSE-SU-2018:0852-1, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, USN-3665-1, VIGILANCE-VUL-25725.

Description of the vulnerability

An attacker can use a vulnerability via Documented CGI Search Algorithm of Apache Tomcat, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-1323

Apache Tomcat JK ISAPI Connector: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of Apache Tomcat JK ISAPI Connector, in order to read a file outside the service root path.
Impacted products: Tomcat, Solaris.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 12/03/2018.
Identifiers: bulletinjan2019, CVE-2018-1323, VIGILANCE-VUL-25528.

Description of the vulnerability

An attacker can traverse directories of Apache Tomcat JK ISAPI Connector, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-1304 CVE-2018-1305

Apache Tomcat: privilege escalation

Synthesis of the vulnerability

An attacker can bypass restrictions of Apache Tomcat, in order to escalate his privileges.
Impacted products: Tomcat, Debian, Fedora, QRadar SIEM, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, RHEL, JBoss EAP by Red Hat, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 23/02/2018.
Identifiers: bulletinapr2018, cpuapr2019, cpujul2019, cpuoct2018, CVE-2018-1304, CVE-2018-1305, DLA-1301-1, DLA-1400-1, DLA-1400-2, DLA-1450-1, DSA-4281-1, FEDORA-2018-50f0da5d38, FEDORA-2018-a233dae4ab, ibm10719117, openSUSE-SU-2018:0852-1, RHSA-2018:0465-01, RHSA-2018:0466-01, RHSA-2018:1447-01, RHSA-2018:1448-01, RHSA-2018:1449-01, RHSA-2018:1450-01, RHSA-2018:1451-01, RHSA-2019:2205-01, SUSE-SU-2018:1847-1, SUSE-SU-2018:3261-1, SUSE-SU-2018:3388-1, USN-3665-1, VIGILANCE-VUL-25358.

Description of the vulnerability

An attacker can bypass restrictions of Apache Tomcat, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2017-12617

Apache Tomcat: code execution via Read-write Default/WebDAV Servlet

Synthesis of the vulnerability

An attacker can use a vulnerability via Read-write Default/WebDAV Servlet of Apache Tomcat, in order to run code.
Impacted products: Tomcat, Debian, NetWorker, Fedora, MariaDB ~ precise, ePO, MySQL Community, MySQL Enterprise, openSUSE Leap, Oracle Communications, Oracle DB, Oracle Directory Server, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle Identity Management, Oracle Internet Directory, Oracle iPlanet Web Server, Tuxedo, WebLogic, Oracle Web Tier, Percona Server, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 20/09/2017.
Identifiers: 504539, 61542, CERTFR-2017-AVI-332, cpuapr2018, cpuapr2019, cpujan2018, cpujul2018, CVE-2017-12617, DLA-1166-1, DLA-1166-2, ESA-2017-097, FEDORA-2017-ef7c118dbc, FEDORA-2017-f499ee7b12, openSUSE-SU-2017:3069-1, RHSA-2017:3080-01, RHSA-2017:3081-01, RHSA-2017:3113-01, RHSA-2017:3114-01, RHSA-2018:0465-01, RHSA-2018:0466-01, SB10218, SUSE-SU-2017:3039-1, SUSE-SU-2017:3059-1, SUSE-SU-2017:3279-1, USN-3665-1, VIGILANCE-VUL-23883.

Description of the vulnerability

An attacker can use a vulnerability via Read-write Default/WebDAV Servlet of Apache Tomcat, in order to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2017-12615

Apache Tomcat: code execution via HTTP PUT JSP File

Synthesis of the vulnerability

An attacker can use a vulnerability via HTTP PUT JSP File of Apache Tomcat, in order to run code.
Impacted products: Tomcat, NetWorker, Fedora, ePO, RHEL, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***.
Severity: 3/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 19/09/2017.
Identifiers: 504539, CERTFR-2017-AVI-314, CVE-2017-12615, ESA-2017-097, FEDORA-2017-ef7c118dbc, FEDORA-2017-f499ee7b12, RHSA-2017:3080-01, RHSA-2017:3081-01, RHSA-2017:3113-01, RHSA-2017:3114-01, RHSA-2018:0465-01, RHSA-2018:0466-01, SB10218, SUSE-SU-2017:3059-1, Synology-SA-17:54, VIGILANCE-VUL-23872.

Description of the vulnerability

An attacker can use a vulnerability via HTTP PUT JSP File of Apache Tomcat, in order to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-12616

Apache Tomcat: information disclosure via VirtualDirContext JSP Source Code

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via VirtualDirContext of Apache Tomcat, in order to obtain sensitive information.
Impacted products: Tomcat, Debian, NetWorker, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 19/09/2017.
Identifiers: 504539, CERTFR-2017-AVI-314, CVE-2017-12616, DLA-1108-1, DLA-1400-1, DLA-1400-2, ESA-2017-097, RHSA-2018:0465-01, RHSA-2018:0466-01, SUSE-SU-2017:3059-1, Synology-SA-17:54, USN-3665-1, VIGILANCE-VUL-23871.

Description of the vulnerability

An attacker can bypass access restrictions to data via VirtualDirContext of Apache Tomcat, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-7675

Apache Tomcat: directory traversal via HTTP/2

Synthesis of the vulnerability

An attacker can traverse directories via HTTP/2 of Apache Tomcat, in order to read a file outside the service root path.
Impacted products: Tomcat, Debian, Solaris.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 11/08/2017.
Identifiers: bulletinoct2017, CVE-2017-7675, DSA-3974-1, VIGILANCE-VUL-23501.

Description of the vulnerability

An attacker can traverse directories via HTTP/2 of Apache Tomcat, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-7674

Apache Tomcat: information disclosure via Cache Poisoning

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Cache Poisoning of Apache Tomcat, in order to obtain sensitive information.
Impacted products: Tomcat, Debian, Fedora, HP-UX, openSUSE Leap, Oracle Fusion Middleware, Solaris, Tuxedo, WebLogic, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading.
Provenance: internet server.
Creation date: 11/08/2017.
Identifiers: bulletinoct2017, cpuapr2018, CVE-2017-7674, DLA-1400-1, DLA-1400-2, DSA-3974-1, FEDORA-2017-a00a087fd4, FEDORA-2017-ab0def38cd, HPESBUX03828, openSUSE-SU-2017:3069-1, SUSE-SU-2017:3039-1, SUSE-SU-2017:3059-1, SUSE-SU-2017:3279-1, USN-3519-1, VIGILANCE-VUL-23500.

Description of the vulnerability

An attacker can bypass access restrictions to data via Cache Poisoning of Apache Tomcat, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-5664

Apache Tomcat: error page tampering

Synthesis of the vulnerability

An attacker can trigger an HTTP error in Apache Tomcat, in order to corrupt the error page documents.
Impacted products: Tomcat, Blue Coat CAS, Debian, Fedora, HPE NNMi, HP-UX, Junos Space, MySQL Community, MySQL Enterprise, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Solaris, Tuxedo, WebLogic, Percona Server, RHEL, JBoss EAP by Red Hat, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, data creation/edition.
Provenance: internet client.
Creation date: 06/06/2017.
Identifiers: bulletinjul2017, cpuapr2018, cpuapr2019, cpujul2019, CVE-2017-5664, DLA-996-1, DSA-3891-1, DSA-3892-1, FEDORA-2017-63789c8c29, FEDORA-2017-e4638a345c, HPESBUX03828, JSA10838, KM03302206, openSUSE-SU-2017:3069-1, RHSA-2017:1801-01, RHSA-2017:1802-01, RHSA-2017:1809-01, RHSA-2017:2493-01, RHSA-2017:2494-01, RHSA-2017:2633-01, RHSA-2017:2635-01, RHSA-2017:2636-01, RHSA-2017:2637-01, RHSA-2017:2638-01, RHSA-2017:3080-01, RHSA-2017:3081-01, SA156, SUSE-SU-2017:3039-1, SUSE-SU-2017:3059-1, SUSE-SU-2017:3279-1, SUSE-SU-2018:1847-1, USN-3519-1, VIGILANCE-VUL-22907.

Description of the vulnerability

The Apache Tomcat product offers a web service.

HTTP error pages may be customized. However, when the page content is provided by a static document instead of a servlet output, Tomcat allows to tamper with this source document.

An attacker can therefore trigger an HTTP error in Apache Tomcat, in order to corrupt the error page documents.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Tomcat: