6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.009 Low
EPSS
Percentile
82.5%
Package : tomcat8
Version : 8.0.14-1+deb8u15
CVE ID : CVE-2016-5388 CVE-2018-8014 CVE-2019-0221
Debian Bug : 929895 898935
Several minor issues have been fixed in tomcat8, a Java Servlet and
JSP engine.
CVE-2016-5388
Apache Tomcat, when the CGI Servlet is enabled, follows RFC 3875
section 4.1.18 and therefore does not protect applications from
the presence of untrusted client data in the HTTP_PROXY
environment variable, which might allow remote attackers to
redirect an application's outbound HTTP traffic to an arbitrary
proxy server via a crafted Proxy header in an HTTP request, aka an
"httpoxy" issue. The 'cgi' servlet now has a 'envHttpHeaders'
parameter to filter environment variables.
CVE-2018-8014
The defaults settings for the CORS filter provided in Apache
Tomcat are insecure and enable 'supportsCredentials' for all
origins. It is expected that users of the CORS filter will have
configured it appropriately for their environment rather than
using it in the default configuration. Therefore, it is expected
that most users will not be impacted by this issue.
CVE-2019-0221
The SSI printenv command in Apache Tomcat echoes user provided
data without escaping and is, therefore, vulnerable to XSS. SSI is
disabled by default. The printenv command is intended for
debugging and is unlikely to be present in a production website.
For Debian 8 "Jessie", these problems have been fixed in version
8.0.14-1+deb8u15.
We recommend that you upgrade your tomcat8 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | tomcat8 | < 8.5.50-0+deb9u1 | tomcat8_8.5.50-0+deb9u1_all.deb |
Debian | 8 | all | tomcat8-admin | < 8.0.14-1+deb8u15 | tomcat8-admin_8.0.14-1+deb8u15_all.deb |
Debian | 8 | all | tomcat7 | < 7.0.56-3+really7.0.94-1 | tomcat7_7.0.56-3+really7.0.94-1_all.deb |
Debian | 9 | all | tomcat8-docs | < 8.5.50-0+deb9u1 | tomcat8-docs_8.5.50-0+deb9u1_all.deb |
Debian | 9 | all | tomcat8-admin | < 8.5.50-0+deb9u1 | tomcat8-admin_8.5.50-0+deb9u1_all.deb |
Debian | 8 | all | tomcat7-examples | < 7.0.56-3+really7.0.94-1 | tomcat7-examples_7.0.56-3+really7.0.94-1_all.deb |
Debian | 8 | all | tomcat8-common | < 8.0.14-1+deb8u15 | tomcat8-common_8.0.14-1+deb8u15_all.deb |
Debian | 8 | all | libservlet3.1-java | < 8.0.14-1+deb8u15 | libservlet3.1-java_8.0.14-1+deb8u15_all.deb |
Debian | 8 | all | tomcat8-examples | < 8.0.14-1+deb8u15 | tomcat8-examples_8.0.14-1+deb8u15_all.deb |
Debian | 8 | all | tomcat8-docs | < 8.0.14-1+deb8u15 | tomcat8-docs_8.0.14-1+deb8u15_all.deb |
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.009 Low
EPSS
Percentile
82.5%