Skip to main content
Hit enter to search or ESC to close
Close Search
Menu
Binary Subscriptions
TomEE for Oracle Insurance Policy Administration Suite
TomEE for OpenText Web Experience Management
TomEE for OpenText Process Suite Platform
TomEE for OpenText AppWorks Platform
TomEE for Dassault Systemes SIMULIA Isight
TomEE for Dassault Systemes 3DEXPERIENCE Platform
Tomcat for Dassault Systemes ENOVIA
Tomcat for Progress OpenEdge
Support Subscriptions
Apache TomEE Support
Apache ActiveMQ Support
Apache Tomcat Support
CVE Patching
Enterprise Support
Tomitribe Community Partnership Program
CVE Index
Resources
Blog
Case Studies & Reports
Tribe’s Videos
Company
About Tomitribe
Community
Contact Us
Login
Get A Quote
Apache TomEE 8.0.x Support
Common Vulnerabilities & Exposures (CVE)
First release:
2019-09-13
Support Lifecycle:
Full Support
CVEs:
88
Namespace:
javax
Get Support
What Versions do we cover?
8.0.0
8.0.1
8.0.2
8.0.3
8.0.4
8.0.5
8.0.6
8.0.7
8.0.8
8.0.9
8.0.10
8.0.11
8.0.12
8.0.13
8.0.14
8.0.15
8.0.16
Latest Apache TomEE 8.0.x CVEs
CVE
Severity
Description
Category
Affected
CVE-2024-28752
2024-03-08
0.0
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (including the default databinding) are not impacted.
data
functional
CWE-918
Details
CVE-2024-24549
2024-01-25
0.0
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
data
operational
CWE-20
Details
CVE-2024-23672
2024-01-19
0.0
Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
data
operational
CWE-459
Details
CVE-2024-21733
2024-01-01
3.1
Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.
data
operational
CWE-209
Details
CVE-2023-51775
2023-12-25
0.0
The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
data
n/a
Details
Most Critical Apache TomEE 8.0.x CVEs
CVE
Severity
Description
Category
Affected
CVE-2020-11998
2020-04-21
9.8
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13
data
Arbitrary code execution via JMX
Details
CVE-2020-1938
2019-12-02
9.8
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
data
operational
AJP Request Injection leading to possible Remote Code Execution
Details
CVE-2022-46364
2022-12-02
9.6
A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
data
operational
CWE-918
Details
CVE-2022-42920
2022-10-14
9.8
Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.
data
CWE-787
Details
CVE-2020-13931
2020-06-08
9.8
If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case.
configuration
operational
Undesired port open with unauthenticated access
Details
What We Deliver
Migration support
Production & Development support
1 hr response-time
Unlimited support incidents
5 languages supported
Fast bug fixes & security patch turnaround
Enterprise Support Details
Subscription Level
Bronze
Silver
Gold
Core Count
64 cores
120 cores
248 cores
Apache Tomcat
✓
✓
✓
Apache TomEE
✓
✓
✓
Apache ActiveMQ
✓
✓
✓
Tribestream API Gateway
✓
✓
✓
SLA
24x7
24x7
24x7
Response Time
1hr
1hr
1hr
Incidents
unlimited
unlimited
unlimited
CVE Patching
unlimited
unlimited
unlimited
Developer Questions
1 parallel
2 parallel
4 parallel
Admin Contacts
2
3
4
Phone, Email, Portal
✓
✓
✓
Professional Services
3 days
5 days
10 days
Training
2 days
3 days
5 days
Feature Development
10 days
17 days
25 days
Get Quote
Get Quote
Get Quote
Close Menu
Binary Subscriptions
TomEE for Oracle Insurance Policy Administration Suite
TomEE for OpenText Web Experience Management
TomEE for OpenText Process Suite Platform
TomEE for OpenText AppWorks Platform
TomEE for Dassault Systemes SIMULIA Isight
TomEE for Dassault Systemes 3DEXPERIENCE Platform
Tomcat for Dassault Systemes ENOVIA
Tomcat for Progress OpenEdge
Support Subscriptions
Apache TomEE Support
Apache ActiveMQ Support
Apache Tomcat Support
CVE Patching
Enterprise Support
Tomitribe Community Partnership Program
CVE Index
Resources
Blog
Case Studies & Reports
Tribe’s Videos
Company
About Tomitribe
Community
Contact Us
Login
Get A Quote
twitter
facebook
linkedin
youtube
github