CVE-2018-11784

Scores

EPSS

0.826high82.6%
0%20%40%60%80%100%

Percentile: 82.6%

CVSS

5.3medium3.x
0246810

CVSS Score: 5.3/10

All CVSS Scores

CVSS 3.x
5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Description

When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to ‘/foo/’ when the user requested ‘/foo’) a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-601CWE-99

Related Vulnerabilities

Exploits

Exploit ID: 50118

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50118

Exploit ID: CVE-2018-11784

Source: github-poc

URL: https://github.com/Cappricio-Securities/CVE-2018-11784

Recommendations

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2019:0485

Vulnerable Software (48)

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.7-12.redhat_12.1.el6jws"}

Source: redhat

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{  "fixed": "9.0.7-12.redhat_12.1.el7jws"}

Source: redhat

Type: Configuration

Product: pki-deps

Operating System: rhel

Trait:
{  "fixed": "10.6-8000020190524054914.55190bc5"}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: rhel 7

Trait:
{  "fixed": "7.0.76-9.el7_6"}

Source: redhat

Type: Configuration

Product: tomcat-admin-webapps

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-docs-webapp

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-el-3.0-api

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-javadoc

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-jsp-2.3-api

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-jsvc

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-lib

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-native

Operating System: rhel

Trait:
{  "fixed": "1.2.17-18.redhat_18.ep7.el6"}

Source: redhat

Type: Configuration

Product: tomcat-native

Operating System: rhel

Trait:
{  "fixed": "1.2.17-18.redhat_18.ep7.el7"}

Source: redhat

Type: Configuration

Product: tomcat-servlet-4.0-api

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat-webapps

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.13-alt1_2jpp8"}

Source: redhat

Type: Configuration

Product: tomcat6

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat6

Operating System: ubuntu xenial 16.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat7

Operating System: ubuntu xenial 16.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat7

Operating System: rhel

Trait:
{  "fixed": "7.0.70-31.ep7.el6"}

Source: redhat