Skip to main content

CVE-2017-12615

By
CVE-2017-12615 Description When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-12615 https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81 Project Category Remote Code Execution Tags data operational Date Disclosed 2017-09-19 Date Discovered 2017-08-07 JTVCYnJhbmNoX2xpc3QlNUQlNUIlMkZicmFuY2hfbGlzdCU1RA== Feel Vulnerable?  Contact…
Read More

CVE-2016-0779

By
CVE-2016-0779 Description The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Also the EJBd can be disabled by following the steps in the reference. Reference: (http://tomee.apache.org/ejbd-transport.html) Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0779 http://tomee.apache.org/ejbd-transport.html http://tomee.apache.org/security/tomee.html https://www.tenable.com/pvs-plugins/9323 Project Category n/a Tags data operational Date Disclosed 2017-04-11 Date Discovered 2015-12-16 JTVCYnJhbmNoX2xpc3QlNUQlNUIlMkZicmFuY2hfbGlzdCU1RA== Feel Vulnerable?  Contact us so we can help you.
Read More

CVE-2016-0706

By
CVE-2016-0706 Description Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Workaround for versions including and above 6.x: Add the below line to the `RestrictedServlets.properties` file: ``` org.apache.catalina.manager.StatusManagerServlet=restricted ``` Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0706 http://www.securityfocus.com/archive/1/537577 Project Category n/a Tags data operational privileged Date Disclosed…
Read More

CVE-2015-6524

By
CVE-2015-6524 Description The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Note: If this component is included as a bundled/transitive dependency of another component, there may not be an upgrade path. In this instance, we recommend contacting the maintainers who included the vulnerable…
Read More

CVE-2014-3612

By
CVE-2014-3612 Description The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames. Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3612 http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt Project Category n/a Tags data operational Date Disclosed 2015-08-24 Date Discovered 2014-05-14 JTVCYnJhbmNoX2xpc3QlNUQlNUIlMkZicmFuY2hfbGlzdCU1RA== Feel Vulnerable?  Contact us so we can help you.
Read More

CVE-2014-0230

By
CVE-2014-0230 Description Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0230 http://tomcat.apache.org/security-8.html Project Category n/a Tags data operational Date Disclosed 2015-06-07 Date Discovered 2013-12-03 JTVCYnJhbmNoX2xpc3QlNUQlNUIlMkZicmFuY2hfbGlzdCU1RA== Feel Vulnerable?  Contact us so we can help you.
Read More

CVE-2014-0227

By
CVE-2014-0227 Description java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0227 http://tools.cisco.com/security/center/viewAlert.x?alertId=37408 http://www-01.ibm.com/support/docview.wss?uid=swg21959707 https://bugzilla.redhat.com/show_bug.cgi?id=1109196 Project Category n/a Tags operational Date Disclosed 2015-02-15 Date Discovered 2013-12-03 JTVCYnJhbmNoX2xpc3QlNUQlNUIlMkZicmFuY2hfbGlzdCU1RA== Feel Vulnerable?  Contact us so we can help…
Read More

CVE-2014-0119

By
CVE-2014-0119 Description Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this…
Read More

CVE-2014-0109

By
CVE-2014-0109 Description Apache CXF before 2.6.14 and 2.7.x before 2.7.11 allows remote attackers to cause a denial of service (memory consumption) via a large request with the Content-Type set to text/html to a SOAP endpoint, which triggers an error. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0109 http://cxf.apache.org/security-advisories.data/CVE-2014-0109.txt.asc Project Category n/a Tags data operational Date Disclosed 2014-05-08 Date Discovered 2013-12-03 JTVCYnJhbmNoX2xpc3QlNUQlNUIlMkZicmFuY2hfbGlzdCU1RA== Feel Vulnerable?  Contact us so we can help you.
Read More

CVE-2014-0099

By
CVE-2014-0099 Description Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header. Mitigation We recommend upgrading to a version of this component that is not vulnerable to this specific issue. Related links: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0099 http://tomcat.apache.org/security-6.html https://www.mail-archive.com/users@tomcat.apache.org/msg113011.html Project Category n/a Tags operational functional Date Disclosed 2014-05-31 Date Discovered 2013-12-03 JTVCYnJhbmNoX2xpc3QlNUQlNUIlMkZicmFuY2hfbGlzdCU1RA== Feel Vulnerable?  Contact us so we can help you.
Read More