Lucene search

K
githubGitHub Advisory DatabaseGHSA-5Q99-F34M-67GC
HistoryOct 17, 2018 - 4:31 p.m.

Apache Tomcat Open Redirect vulnerability

2018-10-1716:31:02
CWE-601
GitHub Advisory Database
github.com
88

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

5.1 Medium

AI Score

Confidence

High

0.791 High

EPSS

Percentile

98.3%

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to ‘/foo/’ when the user requested ‘/foo’) a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Affected configurations

Vulners
Node
github_advisory_databaseorg.apache.tomcat.embed\Matchtomcat-embed-core
OR
github_advisory_databaseorg.apache.tomcat.embed\Matchtomcat-embed-core
OR
github_advisory_databaseorg.apache.tomcat.embed\Matchtomcat-embed-core

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

5.1 Medium

AI Score

Confidence

High

0.791 High

EPSS

Percentile

98.3%