Lucene search

K
kasperskyKaspersky LabKLA11297
HistoryJul 22, 2018 - 12:00 a.m.

KLA11297 Multiple vulnerabilities in Apache Tomcat

2018-07-2200:00:00
Kaspersky Lab
threats.kaspersky.com
240

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.7 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.8%

Multiple serious vulnerabilities have been found in Apache Tomcat. Malicious users can exploit these vulnerabilities to obtain sensitive information and bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A missing host name verification vulnerability can be exploited remotely to obtain sensitive information;
  2. A vulnerability in the tracking of connection closures can be exploited remotely to bypass security restrictions.

Technical details

Vulnerability (1) appears only when using TLS with the WebSocket client was missing. Vendor have been enabled by default.

Vulnerability (2) affects only Apache Tomcat 8.5.x and 9.x

Original advisories

Apache Tomcat 8.x vulnerabilities

Apache Tomcat 9.x vulnerabilities

Apache Tomcat 7.x vulnerabilities

Related products

Apache-Tomcat

CVE list

CVE-2018-8037 warning

CVE-2018-8034 warning

Solution

Update to the latest versionTomcat 7 Software DownloadsTomcat 8 Software Downloads

Tomcat 9 Software Downloads

Impacts

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Apache Tomcat 9.x earlier than 9.0.10Apache Tomcat 8.5.x earlier than 8.5.32Apache Tomcat 8.0.x earlier than 8.0.53Apache Tomcat 7.x earlier than 7.0.90

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.7 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

87.8%