First published: Fri Feb 23 2018(Updated: )
Apache Tomcat versions 7.0.0 to 7.0.84, 8.0.0.RC1 to 8.0.49 and 8.5.0 to 8.5.27 only apply security constraints defined by Servlets once those Servlets are loaded. Depending on the order that Servlets load, some security constraints may not be applied leading to unintended resource exposure. External References: <a href="https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85">https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85</a> <a href="https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50">https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50</a> <a href="https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28">https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28</a> Upstream Fixes: Tomcat 7.0.x: <a href="http://svn.apache.org/viewvc?view=rev&rev=1823322">http://svn.apache.org/viewvc?view=rev&rev=1823322</a> <a href="http://svn.apache.org/viewvc?view=rev&rev=1824360">http://svn.apache.org/viewvc?view=rev&rev=1824360</a> Tomcat 8.0.x: <a href="http://svn.apache.org/viewvc?view=rev&rev=1823319">http://svn.apache.org/viewvc?view=rev&rev=1823319</a> <a href="http://svn.apache.org/viewvc?view=rev&rev=1824359">http://svn.apache.org/viewvc?view=rev&rev=1824359</a> Tomcat 8.5.x: <a href="http://svn.apache.org/viewvc?view=rev&rev=1823314">http://svn.apache.org/viewvc?view=rev&rev=1823314</a> <a href="http://svn.apache.org/viewvc?view=rev&rev=1824358">http://svn.apache.org/viewvc?view=rev&rev=1824358</a>
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <0:7.0.76-9.el7 | 0:7.0.76-9.el7 |
redhat/tomcat7 | <0:7.0.70-25.ep7.el6 | 0:7.0.70-25.ep7.el6 |
redhat/tomcat8 | <0:8.0.36-29.ep7.el6 | 0:8.0.36-29.ep7.el6 |
redhat/tomcat-native | <0:1.2.8-11.redhat_11.ep7.el6 | 0:1.2.8-11.redhat_11.ep7.el6 |
redhat/tomcat-vault | <0:1.1.6-1.Final_redhat_1.1.ep7.el6 | 0:1.1.6-1.Final_redhat_1.1.ep7.el6 |
redhat/tomcat7 | <0:7.0.70-25.ep7.el7 | 0:7.0.70-25.ep7.el7 |
redhat/tomcat8 | <0:8.0.36-29.ep7.el7 | 0:8.0.36-29.ep7.el7 |
redhat/tomcat-native | <0:1.2.8-11.redhat_11.ep7.el7 | 0:1.2.8-11.redhat_11.ep7.el7 |
redhat/tomcat-vault | <0:1.1.6-1.Final_redhat_1.1.ep7.el7 | 0:1.1.6-1.Final_redhat_1.1.ep7.el7 |
redhat/tomcat | <7.0.85 | 7.0.85 |
redhat/tomcat | <8.0.50 | 8.0.50 |
redhat/tomcat | <8.5.28 | 8.5.28 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=9.0.0M1<=9.0.4 | 9.0.5 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=7.0.0<=7.0.84 | 7.0.85 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=8.5.0<=8.5.27 | 8.5.28 |
Tomcat | >=7.0.0<=7.0.84 | |
Tomcat | >=8.0.0<=8.0.49 | |
Tomcat | =8.0.0-rc1 | |
Tomcat | =8.0.0-rc10 | |
Tomcat | =8.0.0-rc3 | |
Tomcat | =8.0.0-rc5 | |
Tomcat | =9.0.0 | |
Tomcat | =9.0.0-milestone1 | |
Tomcat | =9.0.0-milestone10 | |
Tomcat | =9.0.0-milestone11 | |
Tomcat | =9.0.0-milestone12 | |
Tomcat | =9.0.0-milestone13 | |
Tomcat | =9.0.0-milestone14 | |
Tomcat | =9.0.0-milestone15 | |
Tomcat | =9.0.0-milestone16 | |
Tomcat | =9.0.0-milestone17 | |
Tomcat | =9.0.0-milestone18 | |
Tomcat | =9.0.0-milestone19 | |
Tomcat | =9.0.0-milestone2 | |
Tomcat | =9.0.0-milestone20 | |
Tomcat | =9.0.0-milestone21 | |
Tomcat | =9.0.0-milestone22 | |
Tomcat | =9.0.0-milestone23 | |
Tomcat | =9.0.0-milestone24 | |
Tomcat | =9.0.0-milestone25 | |
Tomcat | =9.0.0-milestone26 | |
Tomcat | =9.0.0-milestone27 | |
Tomcat | =9.0.0-milestone3 | |
Tomcat | =9.0.0-milestone4 | |
Tomcat | =9.0.0-milestone5 | |
Tomcat | =9.0.0-milestone6 | |
Tomcat | =9.0.0-milestone7 | |
Tomcat | =9.0.0-milestone8 | |
Tomcat | =9.0.0-milestone9 | |
Tomcat | =9.0.1 | |
Tomcat | =9.0.2 | |
Tomcat | =9.0.3 | |
Tomcat | =9.0.4 | |
Tomcat | >=8.5.0<=8.5.27 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
Oracle Fusion Middleware | =12.2.1.3.0 | |
Oracle Managed File Transfer | =12.1.3.0.0 | |
Oracle Managed File Transfer | =12.2.1.3.0 | |
Oracle Micros Relate Customer Relationship Management Software | =11.4 | |
Tomcat | =9.0.0-m1 | |
Tomcat | =9.0.0-m10 | |
Tomcat | =9.0.0-m11 | |
Tomcat | =9.0.0-m12 | |
Tomcat | =9.0.0-m13 | |
Tomcat | =9.0.0-m14 | |
Tomcat | =9.0.0-m15 | |
Tomcat | =9.0.0-m16 | |
Tomcat | =9.0.0-m17 | |
Tomcat | =9.0.0-m18 | |
Tomcat | =9.0.0-m19 | |
Tomcat | =9.0.0-m2 | |
Tomcat | =9.0.0-m20 | |
Tomcat | =9.0.0-m21 | |
Tomcat | =9.0.0-m22 | |
Tomcat | =9.0.0-m23 | |
Tomcat | =9.0.0-m24 | |
Tomcat | =9.0.0-m25 | |
Tomcat | =9.0.0-m26 | |
Tomcat | =9.0.0-m27 | |
Tomcat | =9.0.0-m3 | |
Tomcat | =9.0.0-m4 | |
Tomcat | =9.0.0-m5 | |
Tomcat | =9.0.0-m6 | |
Tomcat | =9.0.0-m7 | |
Tomcat | =9.0.0-m8 | |
Tomcat | =9.0.0-m9 | |
debian/tomcat9 | 9.0.43-2~deb11u10 9.0.43-2~deb11u12 9.0.70-2 9.0.95-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-1305 is classified as a moderate severity vulnerability.
To fix CVE-2018-1305, upgrade Apache Tomcat to versions 7.0.85, 8.0.50, or 8.5.28 or later.
CVE-2018-1305 affects Apache Tomcat versions 7.0.0 to 7.0.84, 8.0.0.RC1 to 8.0.49, and 8.5.0 to 8.5.27.
CVE-2018-1305 is a vulnerability that may lead to unintended resource exposure depending on the order in which Servlets are loaded.
There are no recommended workarounds for CVE-2018-1305, the best course of action is to apply the necessary updates.