|
|||
Rule General Information |
---|
Release Date: | 2020-08-24 | |
Rule Name: | Apache Tomcat Default Servlet Open Redirect Vulnerability (CVE-2018-11784) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Others | |
Reference: | SecurityFocusBID:105524 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html https://access.redhat.com/errata/RHSA-2019:0130 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E |