When TomEE or Tomcat is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
CVE-2019-12418 - JMX Remote Lifecycle Listener
Severity
7.5
Project
Apache Tomcat & Apache TomEE
Type
MITM/RCE
MITM/RCE = Remote Code Exploit. RCEs pose a serious threat as they allow attackers to inject code into your system and execute it.
Versions affected
Apache Tomcat
Tomcat 7.x
7.0.0 to 7.0.99
Tomcat 8.5.x
8.5.0 to 8.5.50
Tomcat 9.x
9.0.0.M1 to 9.0.0.30
Apache TomEE
TomEE 1.7.x
All
TomEE 7.0.x
7.0.0-M1 to 7.0.7
TomEE 7.1.x
7.1.0 to 7.1.2
TomEE 8.0.x
8.0.0-M1 to 8.0.1
Feel Vulnerable?
Contact us so we can help you.
* These fields are required.
* These fields are required.